In this article I’m going to explain theory, prevention, some practical attacks and forensics related to the Man in the Middle (MitM) attacks to help you understand the risk to your privacy. Those are attacks used to eavesdrop your communication by having access to at least one part of the communication protocol.
Example, Alice sends a letter to Bob and uses Lucifer to deliver it, Lucifer has the MitM position which gives him the ability to read and change the message. Safety of the communication protocol depends Lucifer’s trustworthiness.
Understanding how internet works:
To understand MitM attacks on internet connection, first you have to learn how the internet works in it’s basic form. Three types of devices are used: clients, routers and servers. The most common protocol for client – server communication is Hypertext Transfer Protocol (HTTP). Majority of web browsing, emails, instant messaging etc. is implemented through HTTP.
When you type http://www.deepdotweb.com to your browser, client (you) sends a request for the webpage to the server. The packet (HTTP GET request) is forwarded through several routers to the server. The server then responds with a webpage that gets routed back to client where it is rendered on their screen. It is vital