Man-in-the-Middle Attack Against Key Exchange

This vulnerability enables a hacker to find the session key distributed by a key exchange protocol. This is a man-in-the-middle type of attack. An attacker can exploit this vulnerability without launching a brute force attack on encrypted messages or breaking into any computer. The hacker simply manipulates protocol messages and uses an impersonation tool, such as Hunt.

Exploit Details

  • Name: Man-in-the-middle attack against the initiator of Otway-Rees Key Exchange Protocol.

  • Variants: Man-in-the-middle attack against the two parties of Otway-Rees Key Exchange Protocol.

  • Operating System: All operating systems with which the Otway-Rees Key Exchange Protocol specification may be implemented because ...

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.