SSL Stripping: Forcing HTTPS connections to downgrade to unencrypted HTTP
Session Hijacking: Stealing authenticated session tokens to impersonate legitimate users
Detection Indicators
Duplicate IP addresses in network (multiple devices claiming same IP)
Unexpected certificate warnings from browsers (users often ignore these - major security gap)
Unusual network latency or connection drops during attacks
ARP table inconsistencies showing different MAC addresses for same IP over time
Network monitoring tools detecting MAC address changes for static devices
Notes
Critical Rule: On-path attacks are often undetectable to end users because connectivity appears normal - the attacker forwards traffic after inspection
Modern networks should implement defense in depth - multiple overlapping security controls rather than relying on single solutions
Wireless networks are particularly vulnerable due to shared medium - use WPA3-Enterprise with 802.1X authentication for corporate environments
Consider on-path attacks during network design - isolate management VLANs and use out-of-band management where possible
Exam Tip: Remember that MITM attacks require the attacker to be on the same network segment or control routing between segments - physical network security is foundational