Are you still using that Public WiFi?

Photo by Arget on Unsplash

Intro

Let’s take a scenario

An example of MITM flow

Stateless protocols

Interactions Susceptible to MITM Attacks

Other Forms of Session Hijacking

Prevention

SSH(Secured Shell)

Conclusion

Hello World! I’m a Software Engineer. Loves toying the underlying structures of technologies in the world of zero’s and one’s.