{"id":418,"date":"2019-12-03T18:32:06","date_gmt":"2019-12-03T10:32:06","guid":{"rendered":"http:\/\/cms.aaasec.com.tw\/?p=418"},"modified":"2019-12-03T18:39:32","modified_gmt":"2019-12-03T10:39:32","slug":"s-11","status":"publish","type":"post","link":"https:\/\/cms.aaasec.com.tw\/index.php\/2019\/12\/03\/s-11\/","title":{"rendered":"\u4f55\u70ba\u4e2d\u9593\u4eba\u653b\u64ca\uff1f"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-420\" src=\"https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2019\/12\/July.png\" alt=\"\" width=\"1200\" height=\"800\" \/><!--more--><\/p>\n<p>By Stanley<\/p>\n<h1>\u4e2d\u9593\u4eba\u653b\u64ca Man-in-the-middle Attack<\/h1>\n<p>\u5728 <a href=\"https:\/\/hackmd.io\/j-HJMfVERAqpqC6CfC-r3A\">\u4e4b\u524d\u7684\u6587\u7ae0 <\/a>\u6211\u5011\u63d0\u5230\u4e86\u6709\u95dcWi-Fi\u7684\u5b89\u5168\u6027\u6f14\u5316\uff0c\u4ee5\u53ca\u5982\u4f55\u6709\u6548\u63d0\u5347\u81ea\u8eab\u7684\u9023\u7dda\u5b89\u5168\uff0c\u800c\u5728\u6587\u4e2d\u5c0d\u65bc\u53ef\u80fd\u53d7\u5230\u4e4b\u5371\u5bb3\u50c5\u4ee5\u300c\u4e2d\u9593\u4eba\u653b\u64ca\u300d\u4e94\u500b\u5b57\u7c21\u55ae\u5e36\u904e\uff0c\u90a3\u9ebc\u9019\u6b21\u5c31\u8b93\u5c0f\u7de8\u7c21\u55ae\u4f86\u4ecb\u7d39\u4f55\u70ba\u4e2d\u9593\u4eba(Man-in-the-Middle)\u653b\u64ca\uff0c\u4ee5\u53ca\u5927\u81f4\u4e0a\u6703\u900f\u904e\u90a3\u4e9b\u65b9\u5f0f\u4f86\u9032\u884c\u653b\u64ca\u5427\uff01<\/p>\n<h2>\u4f55\u70ba\u4e2d\u9593\u4eba\u653b\u64ca<\/h2>\n<p>\u6240\u8b02\u4e2d\u9593\u4eba\u653b\u64ca\u662f\u6307\u653b\u64ca\u8005\u5192\u5145\u53d7\u5bb3\u8005\u8207\u4ed6\u4eba\u7684\u9023\u7dda\uff0c\u85c9\u6b64\u63d2\u5165\u53d7\u5bb3\u8005\u7684\u901a\u8a71\u9023\u7dda\u4e2d\uff0c\u4e26\u900f\u904e\u55c5\u63a2\u7b49\u65b9\u5f0f\u7372\u53d6\u901a\u8a71\u9593\u7684\u8cc7\u6599\uff0c\u5982\u4e0b\u5716\u6240\u793a\uff0c\u53d7\u5bb3\u8005\u6839\u64da\u7db2\u7ad9\u8981\u6c42\u586b\u5165\u8cc7\u6599\u6642\uff0c\u653b\u64ca\u8005\u8d81\u6a5f\u63d2\u5165\u4e86\u96d9\u65b9\u4e4b\u9593\u7684\u9023\u7dda\uff0c\u82e5\u662f\u53d7\u5bb3\u8005\u5c07\u81ea\u8eab\u5e33\u865f\u3001\u5bc6\u78bc\u7b49\u6a5f\u5bc6\u8cc7\u6599\u50b3\u9001\u7d66\u7db2\u7ad9\u6642\uff0c\u653b\u64ca\u8005\u4fbf\u80fd\u6514\u622a\u9019\u4e9b\u5c01\u5305\uff0c\u4e26\u5c07\u4e0a\u9762\u7684\u8cc7\u6599\u8907\u88fd\u4e00\u4efd\u5f8c\u518d\u50b3\u81f3\u7db2\u7ad9\u4f3a\u670d\u5668\uff0c\u7531\u65bc\u4e0a\u8ff0\u60c5\u6cc1\u767c\u751f\u7684\u7576\u4e0b\u53ca\u4e8b\u5f8c\u7db2\u7ad9\u7686\u6b63\u5e38\u904b\u884c\uff0c\u53d7\u5bb3\u8005\u7684\u64cd\u4f5c\u4e5f\u80fd\u6b63\u5e38\u5730\u5f97\u5230\u56de\u61c9\uff0c\u56e0\u6b64\u5f88\u96e3\u53bb\u5bdf\u89ba\u5230\u653b\u64ca\u7684\u767c\u751f\u3002<\/p>\n<p>\u9664\u4e86\u4e0a\u9762\u7684\u7bc4\u4f8b\u5916\uff0c\u4e2d\u9593\u4eba\u653b\u64ca\u9084\u5177\u6709\u5404\u7a2e\u5404\u6a23\u624b\u6cd5\uff0c\u4ee5\u4e0b\u662f\u516d\u500b\u8f03\u70ba\u5e38\u898b\u7684\u65b9\u5f0f\u3002<\/p>\n<ul>\n<li>IP\u6b3a\u9a19 (IP Spoofing)<\/li>\n<\/ul>\n<p>\u9019\u7a2e\u65b9\u5f0f\u662f\u653b\u64ca\u8005\u900f\u904e\u507d\u9020\u4f86\u6e90\u5730\u5740\uff0c\u8b93\u53d7\u5bb3\u8005\u4ee5\u70ba\u81ea\u8eab\u7684\u9023\u7dda\u5c0d\u8c61\u662f\u4ed6\u5011\u6240\u4fe1\u4efb\u7684\u76ee\u6a19\uff0c\u85c9\u6b64\u8b93\u53d7\u5bb3\u8005\u7684\u6a5f\u5bc6\u8cc7\u6599\u6d29\u6f0f\u7d66\u653b\u64ca\u8005\u3002<\/p>\n<ul>\n<li>DNS\u6b3a\u9a19(DNS Spoofing)<\/li>\n<\/ul>\n<p>DNS (Domain Name System)\u7c21\u55ae\u4f86\u8aaa\u5c31\u662f\u80fd\u8b93\u90fd\u662f\u6578\u5b57\u7684IP\u4f4d\u5740\u66f4\u6539\u70ba\u4eba\u985e\u8f03\u5bb9\u6613\u8a18\u61b6\u7684\u540d\u7a31\uff0c\u70ba\u4e86\u52a0\u5feb\u8b80\u53d6\uff0cDNS\u901a\u5e38\u6703\u4ee5\u5feb\u53d6\u7684\u65b9\u5f0f\u5b58\u53d6\u5df2\u5c0d\u61c9\u7684IP\u4f4d\u5740\uff0c\u4e26\u77ed\u6642\u9593\u5167\u90fd\u4e0d\u6703\u518d\u6b21\u8a62\u554f\u5176IP\uff0c\u800cDNS\u6b3a\u9a19\u4fbf\u662f\u653b\u64ca\u8005\u5229\u7528\u63d0\u4f9b\u932f\u8aa4\u7684IP\u4f4d\u5740\uff0c\u4f7f\u5f97\u4f3a\u670d\u5668\u5c07DNS\u5c0e\u5411\u81f3\u60e1\u610f\u7684\u7db2\u9801\u3002<\/p>\n<ul>\n<li>ARP\u6b3a\u9a19 (ARP spoofing)<\/li>\n<\/ul>\n<p>ARP(Address Resolution Protocol)\u662f\u4e00\u7a2e\u901a\u8a0a\u5354\u5b9a\uff0c\u5176\u7528\u8655\u662f\u4ee5\u7db2\u8def\u4f4d\u5740\u5b9a\u4f4dMAC\u4f4d\u5740\uff0c\u800c\u6bcf\u53f0\u96fb\u8166\u90fd\u6703\u6709ARP\u8868\u4f86\u8a18\u9304\u9019\u4e9b\u5c0d\u61c9\uff0c\u653b\u64ca\u8005\u53ef\u4ee5\u4e0d\u65b7\u50b3\u9001\u7ac4\u6539\u904eMAC\u4f4d\u5740\u7684\u5c01\u5305\u7d66\u53d7\u5bb3\u96fb\u8166\uff0c\u4e26\u8b93\u8a72\u96fb\u8166\u6301\u7e8c\u5c07\u932f\u8aa4\u7684\u7d00\u9304\u5beb\u5165ARP\u8868\uff0c\u6b64\u5f8c\u82e5\u662f\u53d7\u5bb3\u8005\u6b32\u9023\u63a5\u81f3\u5176\u4ed6\u96fb\u8166\u6642\uff0c\u4fbf\u6703\u628a\u5c01\u5305\u50b3\u81f3\u906d\u7ac4\u6539\u5f8c\u7684MAC\u4f4d\u5740\uff0c\u653b\u64ca\u8005\u5247\u80fd\u5728\u6b64\u4f4d\u5740\u622a\u53d6\u5c01\u5305\u3002<\/p>\n<ul>\n<li>Email\u633e\u6301 (Email hijacking)<\/li>\n<\/ul>\n<p>\u6240\u8b02\u7684Email\u633e\u6301\u5176\u5be6\u5c31\u662f\u6240\u8b02\u7684\u91e3\u9b5a\u90f5\u4ef6\uff0c\u653b\u64ca\u8005\u900f\u904e\u507d\u9020\u81ea\u5df1\u7684\u5bc4\u4ef6\u5730\u5740\uff0c\u6216\u662f\u5229\u7528\u5e33\u5bc6\u5916\u6d41\u7684\u4fe1\u7bb1\u5192\u5145\u53d7\u5bb3\u8005\u6240\u4fe1\u4efb\u7684\u5c0d\u8c61\uff0c\u4ee5\u6b64\u5c07\u4eba\u5f15\u5c0e\u81f3\u60e1\u610f\u7db2\u9801\u6216\u662f\u8a98\u9a19\u4eba\u53bb\u4e0b\u8f09\u60e1\u610f\u7a0b\u5f0f\u3002<\/p>\n<ul>\n<li>SSL\u525d\u96e2 (SSL Stripping)<\/li>\n<\/ul>\n<p>HTTPS\u53ef\u7528\u65bc\u4fdd\u8b77\u7528\u6236\u7684\u8cc7\u8a0a\u4e0d\u88ab\u4eba\u7aca\u53d6\uff0c\u8a31\u591a\u7db2\u7ad9\u4e5f\u90fd\u9010\u6f38\u4ee5\u9019\u7a2e\u65b9\u5f0f\u9032\u884c\u9023\u7dda\uff0c\u800c\u5728\u6b64\u7a2e\u653b\u64ca\u624b\u6cd5\u4e2d\uff0c\u653b\u64ca\u8005\u6514\u622a\u53d7\u5bb3\u8005\u7684HTTPS\u8acb\u6c42\uff0c\u518d\u5c07\u5176\u8f49\u9001\u5230\u53d7\u5bb3\u8005\u6b32\u9023\u7dda\u4e4b\u4f3a\u670d\u5668\uff0c\u96a8\u5f8c\u653b\u64ca\u8005\u4fbf\u80fd\u6536\u5230\u4f3a\u670d\u5668\u7684\u56de\u61c9\u4e26\u80fd\u5c07\u5176\u5f9eHTTPS\u964d\u7d1a\u6210HTTP\u518d\u8f49\u50b3\u81f3\u53d7\u5bb3\u8005\uff0c\u5728\u9019\u4e4b\u5f8c\u53d7\u5bb3\u8005\u5c07\u6703\u8b8a\u6210\u5728HTTP\u7684\u9023\u7dda\u4e0b\u9032\u884c\u64cd\u4f5c\uff0c\u800c\u773e\u6240\u7686\u77e5\u7684\u662fHTTP\u4e26\u4e0d\u5b89\u5168\u3002<\/p>\n<ul>\n<li>WiFi\u7aca\u807d (WiFi Eavesdropping)<\/li>\n<\/ul>\n<p>\u6b64\u7a2e\u60c5\u5f62\u901a\u5e38\u767c\u751f\u5728\u516c\u5171\u5834\u6240\u4e2d\uff0c\u7531\u65bc\u624b\u6a5f\u6216\u662f\u5177\u6709\u7121\u7dda\u7db2\u8def\u5361\u7684\u8a2d\u5099\u5e38\u6703\u81ea\u52d5\u9023\u5165\u4fe1\u865f\u8f03\u5f37\u7684WiFi\uff0c\u56e0\u6b64\u53d7\u5bb3\u8005\u82e5\u662f\u672a\u7981\u6b62\u81ea\u52d5\u9023\u7dda\u529f\u80fd\u7684\u8a71\uff0c\u4fbf\u6709\u53ef\u80fd\u906d\u9047\u9019\u7a2e\u5371\u5bb3\uff0c\u9996\u5148\u516c\u5171\u5834\u6240\u7684WiFi\u5f88\u591a\u90fd\u662f\u672a\u52a0\u5bc6\u7684\uff0c\u672a\u52a0\u5bc6\u7684\u9023\u7dda\u82e5\u662f\u906d\u4eba\u7aca\u807d\u5f8c\uff0c\u5176\u5167\u5bb9\u5c07\u6703\u4ee5\u660e\u6587\u7684\u65b9\u5f0f\u6d29\u6f0f\u7d66\u5c0d\u65b9\uff1b\u6b64\u5916\u653b\u64ca\u8005\u4e5f\u53ef\u4ee5\u81ea\u884c\u63d0\u4f9bWiFi\u71b1\u9ede\uff0c\u5c07\u5176\u516c\u958b\u7d66\u6240\u6709\u4eba\uff0c\u7136\u5f8c\u7b49\u4eba\u4e0a\u9264\uff0c\u4e00\u65e6\u6709\u4eba\u9023\u5165\u9019\u500bWiFi\u5f8c\uff0c\u653b\u64ca\u8005\u4fbf\u80fd\u81ea\u7531\u5730\u76e3\u807d\u53d7\u5bb3\u8005\u7684\u7db2\u8def\u6d41\u91cf\u3002<\/p>\n<h2>\u7d50\u8ad6<\/h2>\n<p>\u96d6\u7136\u4e2d\u9593\u4eba\u653b\u64ca\u76f8\u7576\u591a\u8b8a\uff0c\u4f46\u57fa\u672c\u4e0a\u90fd\u6709\u5171\u901a\u9ede\uff0c\u90a3\u4fbf\u662f\u900f\u904e\u5192\u5145\u8eab\u5206\uff0c\u4f7f\u53d7\u5bb3\u8005\u8aa4\u8a8d\u70ba\u81ea\u5df1\u662f\u5728\u8207\u4ed6\u5011\u6240\u4fe1\u4efb\u7684\u5c0d\u8c61\u9032\u884c\u806f\u7e6b\u3002\u4ee5\u4e0a\u4fbf\u662f\u4e2d\u9593\u4eba\u653b\u64ca\u7684\u7c21\u55ae\u4ecb\u7d39\uff0c\u5c0f\u7de8\u5728\u6b64\u5efa\u8b70\u8b80\u8005\u990a\u6210\u826f\u597d\u7684\u7fd2\u6163\uff0c\u4e0d\u96a8\u610f\u9ede\u64ca\u4f86\u8def\u4e0d\u660e\u7684\u4fe1\u4ef6\uff0c\u4e26\u96a8\u6642\u6ce8\u610f\u7db2\u9801\u662f\u4ee5HTTPS\u9032\u884c\u9023\u7dda\uff0c\u81f3\u65bcWiFi\u76f8\u95dc\u7684\u9632\u8b77 <a href=\"https:\/\/hackmd.io\/j-HJMfVERAqpqC6CfC-r3A\">\u9019\u4e00\u7bc7\u6587\u7ae0 <\/a>\u6709\u66f4\u8a73\u7d30\u7684\u8aaa\u660e\u3002<\/p>\n<h3>Reference<\/h3>\n<p><a href=\"https:\/\/phoenixnap.com\/blog\/man-in-the-middle-attacks-prevention\">What is a Man in the Middle Attack? How Does it Work?<\/a><\/p>\n<p><a href=\"https:\/\/www.rapid7.com\/fundamentals\/man-in-the-middle-attacks\/\">Man-in-the-Middle (MITM) Attacks<\/a><\/p>\n<p><a href=\"https:\/\/us.norton.com\/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html\">What is a man-in-the-middle attack?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[22,21],"_links":{"self":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts\/418"}],"collection":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/comments?post=418"}],"version-history":[{"count":2,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts\/418\/revisions"}],"predecessor-version":[{"id":421,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts\/418\/revisions\/421"}],"wp:attachment":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/media?parent=418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/categories?post=418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/tags?post=418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}