Hacksplaining
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance
Sign Up
Log In
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance Sign Up Log In

Downgrade Attacks

Knowing this, attackers perform downgrade attacks, inserting themselves in the middle of a TLS handshake and attempting to persuade the client and server to fall back to a less secure algorithm—in the hope of being able to intercept and snoop on traffic.

Description
Lessons
Glossary
Terms and Conditions
Privacy Policy

© 2026 Hacksplaining Inc. All rights reserved. Questions? Email us at support@hacksplaining.com