Page 1211 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1211

FIGURE 17.3 A man-in-the-middle attack

               Man-in-the-middle attacks require more technical sophistication than
               many other attacks because the attacker needs to successfully
               impersonate a server from the perspective of the client and

               impersonate the client from the perspective of the server. A man-in-
               the-middle attack will often require a combination of multiple attacks.
               For example, the attacker may alter routing information and DNS
               values, acquire and install encryption certificates to break into an
               encrypted tunnel, or falsify Address Resolution Protocol (ARP)
               lookups as a part of the attack.

               Some man-in-the-middle attacks are thwarted by keeping systems up-

               to-date with patches. An intrusion detection system cannot usually
               detect man-in-the-middle or hijack attacks, but it can detect abnormal
               activities occurring over communication links and raise alerts on
               suspicious activity. Many users often use virtual private networks
               (VPNs) to avoid these attacks. Some VPNs are hosted by an employee’s

               organization, but there are also several commercially available VPNs
   1206   1207   1208   1209   1210   1211   1212   1213   1214   1215   1216