First page Back Continue Last page Summary Graphic
18. Man-in-the-middle
- As initial key distribution is done, place an attacking machine between the machines exchanging keys
- Do a man-in-the-middle attack to make each think you are the other.
- You will now be permanently in the middle of all their communication. 
Notes: