MITM. WHAT IS IT, HOW TO PROTECT YOURSELF AND IMPLEMENTATION FOR INSTRUCTIONAL USE

dc.contributor.authorAbdinurova N.
dc.contributor.authorAkmyrza D.
dc.contributor.authorMirash A.
dc.date.accessioned2023-12-20T06:20:17Z
dc.date.available2023-12-20T06:20:17Z
dc.date.issued2021
dc.description.abstractAbstract. This is an attack in which a cybercriminal intercepts data while it is being transmitted. Man-in-the-Middle attacks are a common type of cybersecurity attack that allows attackers to eavesdrop on communications between two targets. This article discusses how people can protect themselves, what they need to know, and how an attacker performs a MITM attack using the open-source tools bettercap and net-creds in kali Linux. Buttercup is a network attack and monitoring program that can perform ARP spoofing and sniffing. Netcreds is a sniffing tool available by cloning on Github. This article attempts to implement this attack for instructional use.
dc.identifier.citationN. Abdinurova , D. Akmyrza , A. Mirash / MITM. WHAT IS IT, HOW TO PROTECT YOURSELF AND IMPLEMENTATION FOR INSTRUCTIONAL USE / СДУ хабаршысы - 2021
dc.identifier.issn2709-2631
dc.identifier.urihttps://repository.sdu.edu.kz/handle/123456789/1017
dc.language.isoen
dc.publisherСДУ хабаршысы - 2021
dc.subjectMan-In-the-Middle (MITM)
dc.subjectbettercap
dc.subjectnet-creds
dc.subjectkaliLinux
dc.subjectARP spoofing
dc.subjectsniffing
dc.subjectСДУ хабаршысы - 2021
dc.subject№2
dc.titleMITM. WHAT IS IT, HOW TO PROTECT YOURSELF AND IMPLEMENTATION FOR INSTRUCTIONAL USE
dc.typeArticle

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2021.3 жаратылыстану-24-31.pdf
Size:
4.06 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
13.85 KB
Format:
Item-specific license agreed to upon submission
Description: