Minerva_Origin 0 Posted February 18 Share Posted February 18 Hi dear managers, Here there are many experts of security. In many Anti Virus softwares force us to keep windows 10 update. I am connecting to a wi-fi network and blocked all ip addresses in this network with regular windows 10 firewall and the only available ip address is : 192.168.1.1 = gateway + 192.168.1.102 = my own ip address Some people from wi-fi security team told me we are working on hacking people with windows update here. So some hours when i check windows update it hangs and some other hours later it is working. It seems they are tampering something in the other side as Man In The Middle attack. In another day i faced ARP poisoning from them. Just clarify here can they hack people with windows update such that easy or not? How can i prevent "Man In The Middle" attack and ARP poisoning? Quote Link to comment Share on other sites More sharing options...
Minerva_Origin 0 Posted February 19 Author Share Posted February 19 No body here for answer to this question?!!!!! Quote Link to comment Share on other sites More sharing options...
Most Valued Members Nightowl 183 Posted February 19 Most Valued Members Share Posted February 19 For MITM attack to happen , you need to be on the same network with the attacker , for example the attacker would be sitting in your WIFI or LAN network Prevent access to your router from Internet side, update it to latest version or ask your Internet Service Provider to do so Change your WIFI password if you feel someone is there , and I don't think that person would be connected to you through LAN(cables) , since he have to go inside your home and to your router physically Aryeh Goretsky 1 Quote Link to comment Share on other sites More sharing options...
itman 1,510 Posted February 20 Share Posted February 20 Actually, this topic is out of scope for the forum since it doesn't directly relate to Eset products. There is plenty of into on the web on man-in-the-middle attacks. Below are two such references: https://cheapsslsecurity.com/blog/types-of-man-in-the-middle-attacks/ https://beaglesecurity.com/blog/article/man-in-the-middle-attack.html Aryeh Goretsky 1 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.