WizardofWar wrote: » lol, I didn't think it through enough and I really have to read the questions better I think as well, I was just thrown by the fact that Darrils book stated that the man-in-the-middle doesn't modify the data so I was thinking it has to be something else. I didnt do that well on the sample test but I have only been studying for about 8 or so days now and not hard. I got 19/30 of the questions right and I still have 2 chapters of Darrils book to go so I guess I shouldn't get to excited that I didn't know all the material. That question still would have thrown me as I have read that info. I did get some wrong that I have read though so that bothers me.
dynamik wrote: » Modifying data (packet payload) and modifying packets are not the same thing. You guys are not being consistent with your terminology. Unless you're somehow able to passively capture traffic (hub, SPAN port, Ethernet tap, etc. -- also, you're not in the "middle" in these scenarios), you're always going to be modifying the packets. Tools like ettercap also allow you to easily modify the data as well.
erpadmin wrote: » You are right, Darril pretty much says that it doesn't modify traffic in a man-in-the-middle attack. But as Earweed stated, it's really used for eavesdropping or to be used in a replay attack later on. I don't see how you would have been tripped though if you knew the other answers weren't involved in interception or modifying data. You may need to do some more reading to do until stuff clicks (and trust me, Darril is still good....my 870/900 isn't exactly terrible....and while I did have other help, Darril was still the primary resource). One thing that helped me out was Transcender's flashcards (part of their practice exams) of cryptography....one I got that down, I stopped being nervous about the exam and everything "flowed" right. Also, you'll still pass the exam if you read his book twice. It may not be with a 900, but that's when I ask "who gives a ----?" You'll be fine.
WizardofWar wrote: » According to Darrils book there is no modifying of packets in the man-in-the-middle attacks.
WizardofWar wrote: » Yea I noticed that after reading it here a few times that the answer couldn't have been anything else. That's the one thing compTIA questions seem to do to me, it seems to make you second guess the answers at times. I think I now just need more time for some of the info to sink in and stay with me. My plan at this point is to take the test somewhere around Oct 12th. so still quite a bit of time to get this stuff down.
demonfurbie wrote: » yea i didnt quite get his chapter on crytpo so im gonna have to find a diff source for that
Devilsbane wrote: » What if it is an advanced MITM that is intercepting packets in a SSL session? Then the MITM would have to have a SSL session with each of the parties, decrypt the information and then re-encrypt it to deliver it to the host.
WizardofWar wrote: » I would think modifying packets in this scenario would be highly unlikely.