What is a Man-in-the-Middle Attack?
Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security In this video, Chuck Keith covers man in the middle attacks, specifically tho...

CBT Nuggets
67.1K views • Feb 5, 2021

About this video
Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security
In this video, Chuck Keith covers man in the middle attacks, specifically those prepared with ARP spoofing. He will define what a man in the middle attack is, how it works, and then explain how ARP spoofing can be used to substantially increase the potency of a typical MITM attack.
The Address Resolution Protocol, or ARP, is used to find the layer 2 address of the device associated with a given IP address. When someone wants to communicate with the rest of the internet, they must go through a default gateway — their router.
The router’s IP address is easy to discover, but you also need the MAC address. If the user doesn’t already have the MAC address stored in his ARP cache, he’ll use an ARP broadcast to send a request to everyone on his network, asking for the address.
The router is programmed to respond and provide its MAC address, but if someone is able to get in the middle and spoof the ARP, he can gain access to the user’s computer. Chuck will explain how these work and how to defend against them.
🌐 Download the Free Ultimate Networking Cert Guide: https://blog.cbt.gg/nnra
⬇️ 13-Week Study Plan: CCNA (200-301): https://blog.cbt.gg/u2tg
Start learning with CBT Nuggets:
• Cisco CCNA Security (210-260 IINS) | https://courses.cbt.gg/r6n
• Cisco CCNP Security | https://courses.cbt.gg/6t4
• CompTIA Security+ (SY0-501) | https://courses.cbt.gg/c26
• Information Security | https://courses.cbt.gg/463
In this video, Chuck Keith covers man in the middle attacks, specifically those prepared with ARP spoofing. He will define what a man in the middle attack is, how it works, and then explain how ARP spoofing can be used to substantially increase the potency of a typical MITM attack.
The Address Resolution Protocol, or ARP, is used to find the layer 2 address of the device associated with a given IP address. When someone wants to communicate with the rest of the internet, they must go through a default gateway — their router.
The router’s IP address is easy to discover, but you also need the MAC address. If the user doesn’t already have the MAC address stored in his ARP cache, he’ll use an ARP broadcast to send a request to everyone on his network, asking for the address.
The router is programmed to respond and provide its MAC address, but if someone is able to get in the middle and spoof the ARP, he can gain access to the user’s computer. Chuck will explain how these work and how to defend against them.
🌐 Download the Free Ultimate Networking Cert Guide: https://blog.cbt.gg/nnra
⬇️ 13-Week Study Plan: CCNA (200-301): https://blog.cbt.gg/u2tg
Start learning with CBT Nuggets:
• Cisco CCNA Security (210-260 IINS) | https://courses.cbt.gg/r6n
• Cisco CCNP Security | https://courses.cbt.gg/6t4
• CompTIA Security+ (SY0-501) | https://courses.cbt.gg/c26
• Information Security | https://courses.cbt.gg/463
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
67.1K
Likes
1.1K
Duration
5:52
Published
Feb 5, 2021
User Reviews
4.7
(13) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now