Statements (35)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Cyberattack
|
| gptkbp:alsoKnownAs |
gptkb:Man-in-the-Middle_Attacks
|
| gptkbp:canSteal |
Credentials
Sensitive data Session cookies |
| gptkbp:category |
Network security
Information security |
| gptkbp:detects |
Certificate validation
Network monitoring |
| gptkbp:exploits |
gptkb:ARP_spoofing
DNS spoofing Session hijacking SSL stripping Weak encryption Email hijacking Unsecured Wi-Fi networks |
| gptkbp:involves |
Eavesdropping
Message alteration Message interception |
| gptkbp:prevention |
gptkb:VPNs
HTTPS End-to-end encryption Certificate pinning Strong authentication |
| gptkbp:relatedTo |
Phishing
Packet sniffing Replay attack |
| gptkbp:target |
Communication between two parties
|
| gptkbp:usedIn |
Identity theft
Cyber espionage Financial fraud |
| gptkbp:bfsParent |
gptkb:Responder
gptkb:Man-in-the-Middle_Attacks |
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
MITM Attacks
|