id author title date pages extension mime words sentences flesch summary cache txt en-wikipedia-org-336 Man-in-the-middle attack - Wikipedia .html text/html 2698 314 62 In cryptography and computer security, a man-in-the-middle, monster-in-the-middle,[1][2] machine-in-the-middle, monkey-in-the-middle[3] (MITM) or person-in-the-middle[4] (PITM) attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other. If Bob sends his public key to Alice, but Mallory is able to intercept it, an MITM attack can begin. All cryptographic systems that are secure against MITM attacks provide some method of authentication for messages. A public key infrastructure, such as Transport Layer Security, may harden Transmission Control Protocol against MITM attacks. HTTP Public Key Pinning (HPKP), sometimes called "certificate pinning," helps prevent a MITM attack in which the certificate authority itself is compromised, by having the server provide a list of "pinned" public key hashes during the first transaction. SSH-MITM is a tool for man in the middle attacks on SSH Version 2 [20] ./cache/en-wikipedia-org-336.html ./txt/en-wikipedia-org-336.txt