MITM. WHAT IS IT, HOW TO PROTECT YOURSELF ANDIMPLEMENTATION FOR INSTRUCTIONAL USE

Authors

  • N. Abdinurova SDU University Author
  • D. Akmyrza SDU University Author
  • A. Mirash Author

DOI:

https://doi.org/10.47344/sdubnts.v56i3.612

Keywords:

Man-In-the-Middle (MITM), bettercap, net-creds, kaliLinux, ARP spoofing, sniffing

Abstract

This is an attack in which a cybercriminal intercepts data while it is being transmitted. Man-in-the-Middle attacks are a common type of cybersecurity attack that allows attackers to eavesdrop on communications between two targets. This article discusses how people can protect themselves, what they need to know, and how an attacker performs a MITM attack using the open-source tools bettercap and net-creds in kali Linux. Buttercup is a network attack and monitoring program that can perform ARP spoofing and sniffing. Netcreds is a sniffing tool available by cloning on Github. This article attempts to implement this attack for instructional use.

Downloads

Published

2021-09-09

How to Cite

Abdinurova, N. ., Akmyrza, D. ., & Mirash, A. . (2021). MITM. WHAT IS IT, HOW TO PROTECT YOURSELF ANDIMPLEMENTATION FOR INSTRUCTIONAL USE. Journal of Emerging Technologies and Computing, 56(3), 28-35. https://doi.org/10.47344/sdubnts.v56i3.612