Python: Programming for Advanced: Learn the Fundamentals of Python in 7 Days by Michael Knapp
Author:Michael Knapp [Knapp, Michael]
Language: eng
Format: azw3
Published: 2017-06-02T04:00:00+00:00
Chapter 6: Attacking A Computer
As you think about the security on a computer, a man in the middle attack is going to be one of the most common attacks that you can use to get past that security due to the fact that you are going to insert yourself into the target's device and whatever program it is communicating with or if it is communicating with another device. Neither device is going to know that they are not directly talking if you play your cards right.
The easiest way to think about a man in the middle attack is to think of it as a game of checkers. Neither of the opponents knows what the other person is doing. One side is going to make their move which will then go through the individual who is playing two different games, and it will be moved on to the other board without the two people being any wiser as to the fact that someone is interfering with their game. The biggest problem is going to be the time delay that occurs between moves, but that is something that cannot be circumvented.
These attacks are some of the easiest that you can use when going up against the security protocols that are in place on a computer. The simplest man in the middle attack you can use is to eavesdrop. You are going to connect to the victim’s computer through a separate connection and “listen” to the messages that pass through the victim’s computer and who or what they are communicating without, yet they are never going to know that you are there due to the fact they are going to believe that their connection is still private.
While these are easy attacks to carry out, they are also easy attacks to detect. Not just that, but your target is not going to have to do much in order to prevent the attack. All they are going to be required to do is use an authentication method that is going to detect when a hacker is trying to get into the system, therefore, alerting the target. By being forced to deal with an authentication process, you are going to have to ensure that there is a guarantee that has been put into place for whenever messages are sent out from the network to double check that you are allowed to be there. With tamper detection, a message is going to be displayed that has been altered by the hacker so that the victim and their network have “proof” that tells them someone is attempting to hack into their system.
Whenever a system has protection set against man in the middle attacks, messages are going to be displayed to the hacker that asks them for their authentication. Most of the time these messages are going to ask for information to be exchanged over channels that have been secured. The protocols that are set into place will use some sort of agreement protocol that has been developed by using security and various requirements that are also sent through a secure channel.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12570)
Hello! Python by Anthony Briggs(9914)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9796)
The Mikado Method by Ola Ellnestam Daniel Brolund(9777)
Dependency Injection in .NET by Mark Seemann(9337)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8296)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7763)
Grails in Action by Glen Smith Peter Ledbrook(7696)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7557)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7066)
Microservices with Go by Alexander Shuiskov(6828)
Practical Design Patterns for Java Developers by Miroslav Wengner(6746)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6690)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6413)
Angular Projects - Third Edition by Aristeidis Bampakos(6094)
The Art of Crafting User Stories by The Art of Crafting User Stories(5619)
NetSuite for Consultants - Second Edition by Peter Ries(5558)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5363)
Kotlin in Action by Dmitry Jemerov(5062)
