Abstract:
At present wireless network trends to be more and more popular among the population with the millions of users. The Man-In-The-Middle (MITM) attack is one of the most well-known attacks
in computer security, representing one of the biggest concerns for security professionals. MITM
targets the actual data that flows between endpoints, and the confidentiality and integrity of the
data itself. MITM has been one kind of attack where a user gets between the sender and the receiver information. In this report we try to explain different types of MITM attacks. Man in the Middle (MITM) attack is one of the primary techniques in computer base hacking. In this types of attack where the attackers can collect many important data, inject false information, user lost their
different types of online user ID and password. For this, we try to discover how this types of attack
works, describe a method of man-in-the-middle attack based on ARP spoofing and try to create a
method of preventing suck attack.