MITM. WHAT IS IT, HOW TO PROTECT YOURSELF AND IMPLEMENTATION FOR INSTRUCTIONAL USE

  • N. Abdinurova
  • D. Akmyrza
  • A. Mirash

Abstract

This is an attack in which a cybercriminal intercepts data while it is being transmitted. Man-in-the-Middle attacks are a common type of cybersecurity attack that allows attackers to eavesdrop on communications between two targets. This article discusses how people can protect themselves, what they need to know, and how an attacker performs a MITM attack using the open-source tools bettercap and net-creds in kali Linux. Buttercup is a network attack and monitoring program that can perform ARP spoofing and sniffing. Net-creds is a sniffing tool available by cloning on Github. This article attempts to implement this attack for instructional use.
Keywords: Man-In-the-Middle (MITM), bettercap, net-creds, kali-Linux, ARP spoofing, sniffing.
Published
2021-09-09
How to Cite
ABDINUROVA, N.; AKMYRZA, D.; MIRASH, A.. MITM. WHAT IS IT, HOW TO PROTECT YOURSELF AND IMPLEMENTATION FOR INSTRUCTIONAL USE. SDU Bulletin: Natural and Technical Sciences, [S.l.], v. 56, n. 3, p. 28-35, sep. 2021. Available at: <https://journals.sdu.edu.kz/index.php/nts/article/view/612>. Date accessed: 18 apr. 2025. doi: https://doi.org/10.47344/sdubnts.v56i3.612.