top of page
CyberSeth3.png

Adversary-in-the-Middle

Nowadays, threat actors can use strong frameworks and techniques against which users have nearly no chance to escape.
 

This technique is used with phishing to transmit a malicious link and obtain a click. When the user clicks, he is redirected to the real website but it's connection is in fact being transparently proxyied trough a malicious server (with Evilginx for example). The attacker will then steal the user's password and even bypass the MFA protection (with token theft).

​

Click below and check if you are concerned !

"it doesn't matter who we are, what matters is our plan." - Bane

CyberSeth © 2024

bottom of page