A Hidden Hazard: Man-In-The-Middle Attack in Networks
Öz
Anahtar Kelimeler
Kaynakça
- Hekim, H. (2015). Oltalama (Phishing) Saldirilari. Retrieved from academia: http://www.academia.edu/35136881/Oltalama_Phishing_Saldirilari
- Hugo, E. (2016, March 28). Performing Man-In-The-Middle Attack with ARPSpoof. Retrieved from myhackingjournal.blogspot: http://myhackingjournal.blogspot.com/2016/03/performing-man-in-middle-attack-with-arpspoof.html
- Infosec Guide: Defending Against Man-in-the-Middle Attacks. (2017, July 27). Retrieved from trendmicro: https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/infosec-guide-defending-against-man-in-the-middle-attacks
- Man-in-the-Middle (MITM) Attacks. (2018, May 1). Retrieved from rapid7: https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/
- Man-in-the-middle attack. (2018, May 1). Retrieved from wikipedia: https://tr.wikipedia.org/wiki/Man-in-the-middle_attack
- Ramadhan, F. B. (2018, January 25). Kali Linux: Social Engineering Toolkit. Retrieved from linuxhint: https://linuxhint.com/kali-linux-set/
- Rangwala, S. (2015, May 10). Fake Website with DNS Spoofing in Kali Linux. Retrieved from linux-hacking-guide.blogspot: http://linux-hacking-guide.blogspot.com/2015/05/fake-website-with-dns-spoofing-in-kali.html
- Rouse, M., & Cobb, M. (2015, December 8). Man-in-the-middle attack (MitM). Retrieved from internetofthingsagenda.techtarget: https://internetofthingsagenda.techtarget.com/definition/man-in-the-middle-attack-MitM
Ayrıntılar
Birincil Dil
İngilizce
Konular
Bilgisayar Yazılımı
Bölüm
Araştırma Makalesi
Yazarlar
Ahmet Efe
Türkiye
Gizem Kalkancı
Bu kişi benim
Thailand
Mehmet Donk
Bu kişi benim
Serhat Cihangir
Bu kişi benim
Ziya Uysal
Bu kişi benim
Yayımlanma Tarihi
1 Aralık 2019
Gönderilme Tarihi
31 Ekim 2018
Kabul Tarihi
19 Aralık 2018
Yayımlandığı Sayı
Yıl 2019 Cilt: 4 Sayı: 2
is applied to all research papers published by JCS and
is assigned for each published paper.