Statements (49)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Cyberattack
|
| gptkbp:affects |
Wi-Fi connections
Network traffic Email communication Web sessions |
| gptkbp:alsoKnownAs |
MITM attacks
|
| gptkbp:cause |
Identity theft
Unauthorized access Data theft Financial loss Credential compromise |
| gptkbp:describedBy |
gptkb:NIST_guidelines
Security standards Cybersecurity literature OWASP documentation |
| gptkbp:detects |
Certificate validation
Intrusion detection systems Network monitoring Anomaly detection |
| gptkbp:exploits |
gptkb:ARP_spoofing
DNS spoofing Phishing Session hijacking Email interception SSL stripping Unsecured Wi-Fi Weak encryption |
| gptkbp:involves |
Eavesdropping
Message alteration Message interception |
| gptkbp:prevention |
gptkb:TLS/SSL
gptkb:VPNs Encryption Secure key exchange Mutual authentication Certificate pinning |
| gptkbp:relatedTo |
Phishing
Eavesdropping Session hijacking Spoofing Replay attacks |
| gptkbp:target |
Communication channels
|
| gptkbp:usedBy |
gptkb:Hackers
Cybercriminals State actors Penetration testers |
| gptkbp:bfsParent |
gptkb:SMB_Encryption
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Man-in-the-middle attacks
|