<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://www.freebsdwiki.net/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://www.freebsdwiki.net/index.php?action=history&amp;feed=atom&amp;title=MITM</id>
		<title>MITM - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://www.freebsdwiki.net/index.php?action=history&amp;feed=atom&amp;title=MITM"/>
		<link rel="alternate" type="text/html" href="http://www.freebsdwiki.net/index.php?title=MITM&amp;action=history"/>
		<updated>2026-05-07T20:01:32Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.18.0</generator>

	<entry>
		<id>http://www.freebsdwiki.net/index.php?title=MITM&amp;diff=5189&amp;oldid=prev</id>
		<title>Dave at 01:46, 28 July 2005</title>
		<link rel="alternate" type="text/html" href="http://www.freebsdwiki.net/index.php?title=MITM&amp;diff=5189&amp;oldid=prev"/>
				<updated>2005-07-28T01:46:49Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Man In The Middle. Essentially, an exercise in spoofing two sides of a conversation:&lt;br /&gt;
&lt;br /&gt;
Where a normal connection would go along the lines of&lt;br /&gt;
 Alice (to Server): I'm Alice, here is my username, password, credit card number, and other data you need &lt;br /&gt;
 Server (to Alice): I'm Server, looks good, come in.&lt;br /&gt;
&lt;br /&gt;
A MITM attack looks like this:&lt;br /&gt;
 Alice (to Bob, pretending to be Server): here is my username, password, credit card number, and other data you need &lt;br /&gt;
 Bob (to Server, pretending to be Alice): here is my username, password, credit card number, and other data you need&lt;br /&gt;
 Server (to Bob, pretending to be Alice): I'm Server, looks good, come in.&lt;br /&gt;
 Bob (to Alice, pretending to be Server): I'm Server, looks good, come in.&lt;br /&gt;
&lt;br /&gt;
And now Bob knows all the details of Alice's transaction with Server. This is fairly hard to do on a wired LAN, but not impossible. Wirelessly, it's much much much easier, since wireless connections are broadcast everywhere and you can spoof any MAC address you want to. See [[bsdairtools]].&lt;br /&gt;
&lt;br /&gt;
[[Category: FreeBSD Terminology]]&lt;/div&gt;</summary>
		<author><name>Dave</name></author>	</entry>

	</feed>