Security / Man-in-the-Middle Attack
The interception of communication between two systems, where once the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication.
Notes: |
|
|
|