Board logo

subject: Phone Hacking! - An Introduction To "man In The Middle" Attacks. [print this page]


With the widespread use of wireless LANs, frequent Man-in-the-Middle Attacks of MITM are an issue that users require to overcome. The hacker uses a program that appears as the server to the client and as the client to the server. Such attacks can be use to intercept messages or modify messages before transmission. MITM attacks can occur on both wired and wireless networks,0330 Numbers,0300 Numbers.

The dangers of MITM attacks

Man in the middle attacks can penetrate through a secure VPN connection by randomly forcing a connection to re-authenticate with the access point. Authentication information including the username, IP addresses of the client and server, and other data is collected by the hacker who then tries to send a request to the client. A similar procedure is followed to penetrate the server. The data is then captured at both ends by the hacker who then penetrates through the VPN and enters the network as an authorised station,0845 Numbers,0844 Numbers.

The benefits of setting up a secure VoIP system

Man in the middle attacks are a huge concern for businesses that could put their customers at risk especially where their sensitive information is concerned. VoIP systems are particularly vulnerable to MITM attacks where the hacker intercepts SIP message traffic and pretends to act as the calling party to the called party and vice versa. On achieving success, the hacker can intercept calls through a redirection server. One of the remedies is to ensure a secure VoIP when setting up the service. This includes the installation of up-to-date firewalls that limit the amount of damage an attacker can do. Frequent changing of the default password is essential. Remote users must only be allowed to access the system through a password protected VPN. Access to the management interface must also be limited while the username, password and account details of old phones must be removed before removing them. Mobile phones that are connected to VoIP networks must be secured with a PIN,0871 Numbers,0800 Numbers.

MITM attacks are not similar to phishing attacks where victims may not even realise that their traffic is being intercepted. Detecting such attacks can be difficult, which calls for precautions to be taken. Public networks must not be used for any confidential matters. An IDS or Intrusion Detection System can be set up to monitor the traffic flow in a network. In addition, there are several other tools available although the setting up of a VPN or Virtual Private Network is recommended,Freephone Numbers,03 Numbers.

by: Kieron James




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0