- An attack where the attacker positions their workstation logically between two hosts during communication
- The attacker transparently captures, monitors, and relays communications between those hosts
Methods for On-Path Attacks
ARP Poisoning
- Manipulating Address Resolution Protocol (ARP) tables to redirect network traffic
DNS Poisoning
- Altering DNS responses to reroute traffic
Rogue Wireless Access Point
- Creating a fake wireless access point to intercept traffic
Rogue Hub or Switch
- Introducing a malicious hub or switch to capture data on a wired network
Replay Attack
- Occurs when an attacker captures valid data and then replays it immediately with a delay
- Common in wireless network attacks; can also be used in wired networks
Relay Attack
- The attacker becomes part of the conversation between two hosts
- Serves as a proxy and can read or modify communications between the hosts
- Any traffic between the client and the server goes through the attacker
Challenges with Replay and Relay
- Encryption can make interception and crafting communication difficult