Definitions

Sorry, no definitions found. You may find more data at mitm.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word MitM.

Examples

  • One thing MitM attacks are good for is annoying that perv who has been in the corner for hours watching porn.

    Popular Posts Across MetaFilter 2010

  • Another thing worth doing often is scanning for hacking tools such as sniffers, password crackers, MitM tools, and others.

    Help Net Security - News 2010

  • Another thing worth doing often is scanning for hacking tools such as sniffers, password crackers, MitM tools, and others.

    Help Net Security - News 2010

  • This is a common scenario on security incidents, where Man-in-the-Middle (MitM) attacks or direct web server breaches modify the SSL/TLS certificate offered to the victim, and when accidentally accepted, the attacker can intercept and modify the "secure" HTTPS channel.

    SANS Internet Storm Center, InfoCON: green 2010

  • At the 2008 Defcon hacking conference in Las Vegas, a security researcher demonstrated a Man-in-the-Middle (MitM) attack able to hijack Gmail accounts, precisely because the lack of HTTPS.

    Softpedia - Windows - All 2010

  • The authentication gaps in the TLS session renegotiation procedure were discovered by a software engineer named Marsh Ray, and can be exploited in a man-in-the-middle (MitM) scenario to inject plain text in the session.

    Softpedia News - Global Lucian Constantin 2010

  • While an MitM can talk to both parties, they can't know that six-digit PIN.

    Wi-Fi Networking News 2009

  • Diffie-Hellman key exchange, which allows public exchange of two keys, they still have the MitM issue, as do all public key exchange systems.

    Wi-Fi Networking News 2009

  • If so, that can enable the PIN to be passed without an MitM attack.

    Wi-Fi Networking News 2009

  • Elliptic Curve Diffie-Hellman algorithm, which avoids man-in-the-middle (MitM) attacks by using an out-of-band method to confirm a key exchange.

    Wi-Fi Networking News 2009

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.