MITM Detection

1. Overview

Man-In-The-Middle attacks is when the bad actor place itself between 2 ends of the communication. He can intercept packets, and potentially (very likely) steal crenditial or valuable information and even temper with the communication. To achive this, a bad actor typically needs 1. Sniffing(capture) 2. Spoofing(redirect) the traffic (aka active sniffing).

2. Description

2.1 Spoofing (getting ready for MITM)

2.1.1 ARP Spoofing

2.1.2 DNS Spoofing

2.2 SSL Striping (performing MITM)

HTTPS encrypt message and prevent the bad actors from looking at the content. However, when a MITM is performed, the bad actors can intecept the message and replay the message to the victim with HTTP, downgrading the communication protocol.

Extended Reading


Last Modified: 2025-12-27
Have Questions? Shoot me a text » Linkedin