Hi All,
As per official guide correct answer for below question is C: "Man in the middle". Can anyone explain how attcker will be to read TLS encrypted communication in this case?
Question : The following figure shows an example of an attack where Mal, the attacker, has redirected
traffic from a user’s system to their own, allowing them to read TLS encrypted traffic. Which
of the following terms best describes this attack?
A. A DNS hijacking attack
B. An ARP spoofing attack
C. A man-in-the-middle attack
D. A SQL injection attack
It's still a "man-in-the-middle" attack, because none of the other answers fit. How it happens all depends on the talents of the attacker.
This Broadcom guide offers a brief suggestion on how such an attack could occur, for reference.
@Sundas wrote:Can anyone explain how attacker will be to read TLS encrypted communication in this case?
MITM/AITM (Adversary in the middle) is a necessary, but not sufficient step. More components are necessary:
When done by (questionably) good actors, such as the corporate firewall, this is called "SSL Inspection", which is a good term to Google for a deeper explanation.
Many technologies (pinning, stapling, CAA) are being developed to address this risk, with varying success.