{"id":5420,"date":"2023-09-17T17:10:31","date_gmt":"2023-09-17T15:10:31","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=5420"},"modified":"2023-09-17T17:10:52","modified_gmt":"2023-09-17T15:10:52","slug":"man-in-the-middle-attack-mitm","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2023\/09\/17\/man-in-the-middle-attack-mitm\/","title":{"rendered":"Man-in-the-Middle Attack \u2013 MitM"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Napad \u010dovjek u sredini predstavlja (eng. <em>Man-in-the-Middle Attack \u2013 MitM<\/em>) vrstu sajber napada u kome se <a href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/\" target=\"_blank\" rel=\"nofollow noopener\">zlonamjerni akter<\/a> ubacuje u razgovor izme\u0111u dvije strane, la\u017eno se predstavlja za obje strane i dobija pristup informacijama koje su dvije strane poku\u0161avale da podjele. Zlonamjerni akter presrec\u0301e, \u0161alje i prima podatke koji su namijenjeni nekom drugom \u2013 ili uop\u0161te nisu namijenjeni za slanje, a da nijedna spoljna strana ne zna sve dok ve\u0107 nije prekasno.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><em>MitM<\/em> napadi se koriste za kra\u0111u akreditiva ili li\u010dnih podataka, \u0161pijuniranje \u017ertve ili sabotiranje komunikacije ili korumpiranih podataka. Mete su obi\u010dno kupci finansijskih aplikacija, <em>SaaS<\/em> preduze\u0107a, Internet stranice za e-trgovinu i drugih Internet lokacija na kojima je potrebna prijava.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Ovi napadi se izvr\u0161avaju ometanjem legitimnih mre\u017ea ili stvaranjem la\u017enih mre\u017ea koje napada\u010d kontroli\u0161e. Kompromitovanom saobra\u0107aju se tada oduzima \u0161ifrovanje da bi se taj saobra\u0107aj ukrao, promijenio ili preusmjerio na odredi\u0161te napada\u010da po izboru. Po\u0161to napada\u010di mo\u017eda ne\u010dujno posmatraju ili ponovo \u0161ifruju prestignuti saobra\u0107aj do njegovog namjeravanog izvora nakon snimanja ili izmijene, napad mo\u017ee biti te\u0161ko uo\u010diti.<\/span><\/p>\n<div id=\"attachment_5421\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5421\" class=\"size-full wp-image-5421\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/Man-in-the-Middle-Attack-\u2013-MitM.jpg\" alt=\"MitM\" width=\"1024\" height=\"616\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/Man-in-the-Middle-Attack-\u2013-MitM.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/Man-in-the-Middle-Attack-\u2013-MitM-300x180.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/Man-in-the-Middle-Attack-\u2013-MitM-768x462.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/Man-in-the-Middle-Attack-\u2013-MitM-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-5421\" class=\"wp-caption-text\"><em>Man-in-the-Middle Attack \u2013 MitM; Dizajn: Sa\u0161a \u0110uri\u0107<\/em><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Napad \u010dovjek u sredini predstavlja (eng. Man-in-the-Middle Attack \u2013 MitM) vrstu sajber napada u kome se zlonamjerni akter ubacuje u razgovor izme\u0111u dvije strane, la\u017eno se predstavlja za obje strane i dobija pristup informacijama&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":5421,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[541,390],"class_list":["post-5420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-leksikon","tag-man-in-the-middle-attack","tag-mitm"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=5420"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5420\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/5421"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=5420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=5420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=5420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}