05-05-2025 03:27 PM - edited 05-05-2025 03:31 PM
I don't think phishing counts as man in the middle but cisco says it is and I know for a fact that DHCP spoofing and impersonating public wifi is also a man in the middle. Why does CISCO think there are only two or is the test playing mind games with multiple correct answers?
Edit: Never mind, I misread the content. Phishing is a means of installing a man in the middle, not a man in the middle on its own.
Solved! Go to Solution.
05-06-2025 01:51 AM
Hello @csams10
Phishing is not a man-in-the-middle (MitM) attack because it operates through social engineering, not through intercepting or manipulating communication between two parties.
A man-in-the-middle attack occurs when an attacker intercepts and manipulates communication between two legitimate parties (e.g., between a user and a website) without their knowledge. The attacker inserts themselves into the communication flow, acting as a "middleman" to eavesdrop, alter, or steal information in real time.
Phishing doesn’t involve intercepting communication. Instead, it entices the victim to directly interact with the attacker (e.g., by visiting a fake website or responding to a fraudulent email). This is fundamentally different from MitM attacks, where the attacker remains "invisible" between the two legitimate parties.
Regards,
Amirhossein Mojarrad
+++++++++++++++++++++++++++++++++++++++++++++++++++
++++ If you find this answer helpful, please rate it as such ++++
+++++++++++++++++++++++++++++++++++++++++++++++++++
05-05-2025 09:28 PM
Hello @csams10
the key is often to pick the "most correct" or "best" answer in the context given...
Phishing by itself is not a Man-in-the-Middle atack. It's a social engineering tactic used to trick users into giving up credentials or installing malware, which can enable a MitM scenario later—like installing a rogue certificate or redirecting traffic through a malicious proxy.
05-06-2025 01:51 AM
Hello @csams10
Phishing is not a man-in-the-middle (MitM) attack because it operates through social engineering, not through intercepting or manipulating communication between two parties.
A man-in-the-middle attack occurs when an attacker intercepts and manipulates communication between two legitimate parties (e.g., between a user and a website) without their knowledge. The attacker inserts themselves into the communication flow, acting as a "middleman" to eavesdrop, alter, or steal information in real time.
Phishing doesn’t involve intercepting communication. Instead, it entices the victim to directly interact with the attacker (e.g., by visiting a fake website or responding to a fraudulent email). This is fundamentally different from MitM attacks, where the attacker remains "invisible" between the two legitimate parties.
Regards,
Amirhossein Mojarrad
+++++++++++++++++++++++++++++++++++++++++++++++++++
++++ If you find this answer helpful, please rate it as such ++++
+++++++++++++++++++++++++++++++++++++++++++++++++++
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide