Man-in-the-Middle Detection

Detecting ARP Spoofing

ARP (Address Resolution Protocol) maps IP addresses to MAC addresses in a local network. When a device wants to send data to another IP, it first asks: "Who has this IP?” The correct device replies with its MAC address.

In ARP spoofing, an attacker sends fake ARP replies to trick devices into associating the attacker’s MAC address with a legitimate IP, usually the default gateway. This allows the attacker to intercept, modify, or redirect traffic.

Unmasking DNS Spoofing

DNS Spoofing (or DNS Cache Poisoning) è una tecnica di attacco informatico che mira a ingannare il sistema DNS per reindirizzare gli utenti verso siti falsi o controllati dall’attaccante, invece che verso quelli legittimi. Il DNS cache poisoning avviene quando un attaccante riesce a inserire informazioni DNS false nella cache di un server DNS.

Spotting SSL Stripping in Action

SSL stripping is a man-in-the-middle technique in which an attacker intercepts and modifies traffic to remove or prevent TLS encryption between a client and a server. This causes the client to communicate over HTTP instead of HTTPS. The attacker retains a secure (HTTPS) session with the server while relaying plain HTTP to the victim, enabling eavesdropping and credential capture.

Summary:

  1. ARP Spoofing (cache poisoning)
  2. DNS Spoofing (forged DNS responses)
  3. SSL Stripping (TLS downgrade / credential capture)