First page Back Continue Last page Summary Graphic
18. Man-in-the-middle
As initial key distribution is done, place an attacking machine between the machines exchanging keys
Do a man-in-the-middle attack to make each think you are the other.
You will now be permanently in the middle of all their communication.
Notes: