![]() ![]() For example, in the context of stealth downloading, the objective is to trick users into downloading a malicious application to their terminal (the application will be used by the hacker later). To achieve this, he will establish several strategies that will deceive the user and push him to commit certain actions. This participation is obtained without real will on the part of the user. More often than not, when a hacker tries somehow to attack a user's account or device, whether through malware or a hijacking technique, they need the participation of their victim. He can then perceive the exchanges from his position and collect connection data to later succeed in his computer attack. The objective is to be active between this bridge which will connect these two interlocutors. " The man in the middle Attack " essentially consists of the cyber criminal creating a bridge between two points of communication.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |