Man-in-the-Middle
Man-in-the-Middle (MitM) — Intercepting and Manipulating Communications in Transit
A Man-in-the-Middle (MitM) attack occurs when an attacker intercepts, monitors, or alters communication between two parties without their knowledge. This SECMONS glossary entry explains how MitM attacks work, common techniques, real-world impact, and how defenders should mitigate interception risks.
Man-in-the-Middle Attack Technique — Intercepting and Manipulating Network Communications
Technical explanation of man-in-the-middle attacks, a technique in which attackers intercept and potentially modify communications between systems in order to steal data or manipulate interactions.