Skip to main content
短.be

Man-in-the-Middle Attack

A cyberattack in which an attacker intercepts communication between two parties to eavesdrop on or tamper with data. HTTPS adoption has driven countermeasures forward.

Nov 9, 2025 · About 1 min read

Security

A man-in-the-middle attack (MITM) is a cyberattack in which a third party (the attacker) secretly inserts themselves into a communication between two parties, eavesdropping on or altering the data in transit. In a postal analogy, it is as if a mail carrier opens a letter, reads or rewrites the contents, and then delivers it.

A classic MITM technique exploits public Wi-Fi. The attacker sets up a rogue access point in a cafe or airport (e.g., "Free_Airport_WiFi"), then intercepts all traffic from anyone who connects. According to IBM, roughly 25% of public Wi-Fi networks are unencrypted and vulnerable to MITM attacks.

The connection between short URLs and MITM attacks centers on HTTP (unencrypted) short URLs. If the redirect is served over HTTP, an attacker can rewrite the Location header and redirect users to a phishing site. Reputable short URL services use HTTPS, which prevents this attack.

The most effective defense against MITM attacks is HTTPS (TLS/SSL). HTTPS encrypts the communication so that even if intercepted, the content cannot be read. Server certificates also verify the identity of the remote party, preventing connections to impersonating servers. Setting the HSTS (HTTP Strict Transport Security) header forces the browser to use HTTPS automatically, blocking HTTP downgrade attacks as well.

A VPN (Virtual Private Network) is another effective countermeasure. A VPN wraps all traffic in an encrypted tunnel, enabling safe communication even on public Wi-Fi. Related books are available on Amazon.

Share on XHatena

Was this article helpful?

Related Terms

Related Articles

FAQ

Does HTTPS completely prevent man-in-the-middle attacks?
It prevents nearly all of them, but not 100%. If a user ignores a fake certificate warning and proceeds, or if an attacker compromises a certificate authority and obtains a legitimate certificate, the protection can be bypassed. Certificate Transparency helps mitigate this risk.
Should I avoid using public Wi-Fi entirely?
With a VPN, public Wi-Fi can be used safely. Without a VPN, stick to HTTPS-only sites and avoid sensitive operations like logging in or making payments.
What is the risk of a MITM attack via a short URL?
The risk is low if the short URL service uses HTTPS. However, HTTP short URLs are vulnerable to redirect tampering. Choose a trusted service and verify that the URL begins with https://.

Ready to create a short URL?

Shorten a URL for Free