Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 355
  • Last Modified:

how hacker attacks in internet

          I read at many online documents that in an Internet environment an hacker can attack on user data and thus may lead to steal info in packets or modify it and resend to original destined server. But i reuire that info in diagramaic form and also some practical examples in real world. where to find them?
         What exactly i want to know is that we know hacker attacks but we also know that data travels in internet from routers to routers   then if from src pc to router1 to no. of routers to dst pc is path for data is then where can hacker be located here.
  • 3
  • 2
1 Solution
what you're describing is a MITM - man-in-the-middle attack
it can be anywhere in the middle between source and destination, hence the name: someone on a server or router or even just plugging to the wire

You're safe (in terms of current technology) against this when you use encrypted protocols, like HTTPS/SSL/TLS.
But you're still vulnerable to infinite number of other attacks ...
b123coderAuthor Commented:
hello ahoffmann,
               So that mean say traffic is from organisation 1 to organisation2 and in that pc1 is in organisation and pc2 is in organisations 2 then when data sent from pc1 to pc2 then it will travel thro' many routers to reah pc2. then where can be MIM be placed himself?
               I think there is no control if no sorce routing is used for how data travels from pc1 to pc2 right??
                 Also can you please tell me besides having SSL/TLS why still attacks are there?
> then where can be MIM be placed himself?
not shure what you mean, but MITM can be anywhere, including source (pc1) and destination (pc2), for example 'cause there is some malware (aka virii, trojans, etc.)

> ..  there is no control if no sorce routing  ..
but even with source routing you usually have no control over the routers, nor the wire (someone plugs to the wire directly)

> .. why still attacks are there?
- any kind of malware on source and/or destination (see above)
- spoofed source or destination
- proxies
- if source or destination is a web server and/or application server:
   cross-site scripting, SQL injection, command injection, session hijacking/fixation/riding, second order code attacks, etc. etc.
Transaction-level recovery for Oracle database

Veeam Explore for Oracle delivers low RTOs and RPOs with agentless transaction log backup and transaction-level recovery of Oracle databases. You can restore the database to a precise point in time, even to a specific transaction.

b123coderAuthor Commented:

what are the aviail solutions to man in middle attack? are they all protecting against MIMA?? if not then what current development is going on ?
MITM is permanent threat, and you never get solutions for threats, that's their nature ;-)
you just can check if you're vulnerable for those attacks, and the solution then is encryption and strong permisions for physical acces to your devices, no development necessary
David PiniellaCommented:
aside from encryption and secure physical access, good and secure authentication of what servers you're connecting to is also a must -- SSL, ssh hashes to verify that the host you're ssh'ing into is the one it says it is, et cetera, but as ahoffman says, there's nothing that you can really do to make the threat go away.

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now