What is Man-in-the-Middle?

Filed in Uncategorized

WARNING:

This is only for education purpose. Do not use this to do illegitimate action to other systems without legal permissions.

There are a keyword that is popular in our cyber community, Man-in-the-Middle. A man in the middle of what? What is this term?

It turns out that Man-in-the-Middle is a cyber attack that is conducted when the packet is still in the transport process, or still in the air.

The key principle of it is interception. How does it work?

In the normal connection, the packet will be, sent straightforward to the destination.

However, if the Man-in-the-Middle occurred, the things will become as below:

The packets that supposed to be sent straight to the destination are being intercepted by the third party. It will cause a serious threats for credentials, or even worse, unwanted transactions.

That is the simple explanation of Man-in-the-Middle.

WARNING:

This is only for education purpose. Do not use this to do illegitimate action to other systems without legal permissions.

Explanation of How Reverse TCP Attacks Work

Filed in Uncategorized

WARNING:

This is only for education purpose. Do not use this to do illegitimate action to other systems without legal permissions.

In one of my posts, I had demonstrated you how to use reverse TCP by pentestmonkey.  But, how does reverse tcp works? In this post, we’re going to take a closer look at reverse TCP.

If the client requesting something to the server, that is forward TCP connection. Basically, the server will send a regular response as usual.

When doing something illicit, e.g. request poisoning, to the server, if the server implement proper security to handle it, the attack will be failed.

But, what happen if the, position of both is inverted? That is the thing that will cause serious security Issue.

In reverse TCP, server is the one that sent the request, and the client is the one that is responded to the request.

This kind of connection is dangerous, due to the firewall doesn’t block the illicit response, unlike when if the packet is a request.

That is why there are a significant number of Reverse TCP attacks.

 

 

WARNING:

This is only for education purpose. Do not use this to do illegitimate action to other systems without legal permissions.

Oenology Categories
Click to view/hide
Oenology Tags
Click to view/hide
Oenology Post Formats
Click to view/hide
Posts Calendar
Click to view/hide
June 2019
M T W T F S S
 12
3456789
10111213141516
17181920212223
24252627282930