Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

Man in the middle?


So, as you probably read in previous chapters, you know that the MITM attack stands for Man in the middle. Although this might sound a bit out of key, it accurately expresses the substantiality of the whole thing. Let's see how this attack works.

Some of you might've heard about the Alice and Bob example, which explains what the MITM attack is based on. For those who are not familiar with this, let's say that there are two people—Alice and Bob. Alice tries to communicate with Bob by sending him a message. What they don't know is that there's an attacker trying to intercept and eavesdrop the whole conversation by performing the MITM attack on a network where these two people communicate on.

First, Alice asks Bob for his public key. Obviously, this doesn't happen in a normal conversation, but the public key is necessary in this case to establish a key-protected conversation between Alice and Bob. Public keys are typically used to encrypt plaintext (for example, text messages...