How does the airdrop mitm attack in the given photo take place step by step?

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

How does the airdrop mitm attack in the given photo take place step by step?

Sender "Jane"
Attacker
Receiver "Jehn"
(1) DISCOVERY (as in Figure 2)
(2) AUTHENTICATION
HTTPS POST Discover
DoS. Attacker disrupts all overheard
connections by mounting a TCP
reset attack thereby preventing Jane
from discovering John.
TCP RST
TCP RST
HTTPS POST Discover
Only while John is not
discoverable by everyone, the
attacker periodically tries to
authenticate to John.
HTTPS OK 200
withour device name
Cantaris Cry
HTTPS POST Discover
When John already is or becomes
discoverable by everyone, the
attacker successfully authenticates
to John.
HTTPS OK 200
uth device name "John k iPhone™
Everyone
Attacker advertises
AirDrop service as in (1)
The attacker immdiately starts
advertising a service using "John"
as its computer name.
Jane authenticates and displays
the attacker s identity "John" in
the sharing pane.
HTTPS POST /Discover
ADrop
" w shepoto
HTTPS OK 200
with device name "John
(3) DATA TRANSFER
HTTPS POST/IAsk
with device name "Jane's iPhone"
HTTPS POST IAsk
with device namle "Jane"
Jane selects "John" as the receiver.
Decine
Acset
Attacker forwards request with
original thumbnail and device name
"Jane ": forwards response as is.
HTTPS OK 200
HTTPS OK 200
HTTPS POST Upload
HTTPS POST Upload o0
Attacker receives original file and
forwards a modified copy to John
HTTPS OK 200
HTTPS OK 200
Figure 13: Protocol flow and user interaction of our MitM attack on AirDrop.
Transcribed Image Text:Sender "Jane" Attacker Receiver "Jehn" (1) DISCOVERY (as in Figure 2) (2) AUTHENTICATION HTTPS POST Discover DoS. Attacker disrupts all overheard connections by mounting a TCP reset attack thereby preventing Jane from discovering John. TCP RST TCP RST HTTPS POST Discover Only while John is not discoverable by everyone, the attacker periodically tries to authenticate to John. HTTPS OK 200 withour device name Cantaris Cry HTTPS POST Discover When John already is or becomes discoverable by everyone, the attacker successfully authenticates to John. HTTPS OK 200 uth device name "John k iPhone™ Everyone Attacker advertises AirDrop service as in (1) The attacker immdiately starts advertising a service using "John" as its computer name. Jane authenticates and displays the attacker s identity "John" in the sharing pane. HTTPS POST /Discover ADrop " w shepoto HTTPS OK 200 with device name "John (3) DATA TRANSFER HTTPS POST/IAsk with device name "Jane's iPhone" HTTPS POST IAsk with device namle "Jane" Jane selects "John" as the receiver. Decine Acset Attacker forwards request with original thumbnail and device name "Jane ": forwards response as is. HTTPS OK 200 HTTPS OK 200 HTTPS POST Upload HTTPS POST Upload o0 Attacker receives original file and forwards a modified copy to John HTTPS OK 200 HTTPS OK 200 Figure 13: Protocol flow and user interaction of our MitM attack on AirDrop.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY