![]() Read more Navigate Downĭefending Against Physical Attacks in Wireless Sensor Networks Modification attacks could be performed by code that is inserted and left behind, particularly if the target media is text-based such as IM, but other tools do require the active participation of the attacker to get the right timing. The attacker also has to insert software in the network path in a true man-in-the-middle (MiTM) attack where one is able to not just observe packets, but actually receive the packets, modify them, and send them on. The attacks are only useful if one can modify the communications stream while the communication is taking place. Modification attacks have the same need as eavesdropping attacks to get to the right point in the network, but they also have a timing requirement. An attacker can insert the software onto a compromised device by direct insertion or by a virus or other malware, and then come back some time later to retrieve any data that is found or trigger the software to send the data at some determined time. ![]() ![]() ![]() The attacker does not need to have any ongoing connection to the software at all. Dan York, in Seven Deadliest Unified Communications Attacks, 2010 Publisher SummaryĮavesdropping attacks are easier and can be passive, that is, a piece of software can simply be sitting somewhere in the network path and capturing all the relevant network traffic for later analysis. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |