Statements (34)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Cyberattack
|
gptkbp:alsoKnownAs |
gptkb:Man-in-the-Middle_Attacks
|
gptkbp:canSteal |
Credentials
Sensitive data Session cookies |
gptkbp:category |
Network security
Information security |
gptkbp:detects |
Certificate validation
Network monitoring |
gptkbp:exploits |
gptkb:ARP_spoofing
DNS spoofing Session hijacking SSL stripping Weak encryption Email hijacking Unsecured Wi-Fi networks |
https://www.w3.org/2000/01/rdf-schema#label |
MITM Attacks
|
gptkbp:involves |
Eavesdropping
Message alteration Message interception |
gptkbp:prevention |
gptkb:VPNs
HTTPS End-to-end encryption Certificate pinning Strong authentication |
gptkbp:relatedTo |
Phishing
Packet sniffing Replay attack |
gptkbp:target |
Communication between two parties
|
gptkbp:usedIn |
Identity theft
Cyber espionage Financial fraud |
gptkbp:bfsParent |
gptkb:Responder
|
gptkbp:bfsLayer |
7
|