MITM (man-in-the-middle) attack
A class of attacks involving an intermediary acting for its own benefit: after inserting itself between two parties exchanging data, a third participant receives unauthorized access to their traffic with the ability to do virtually anything with it. The intermediary makes effort to hide itself in order not to evoke any legitimate parties’ suspicions of breaching the privacy and integrity of their traffic.
Other terms in this category
UDP floodTeardrop AttackWhat is an ICMP Flood Attack?What Is a Ping Flood?IP fragmentation attackSYN/ACK floodRST/FIN floodSlowloris or session attacksHTTP floodRecursive HTTP GET floodVoIP floodNTP floodDNS AmplificationIP Null AttackUDP floodSYN flood, or SYN attackSIP malformed attackSNMP reflection attackCharGEN floodMS SQL reflection DDoS attackMemcached DDoS attack
We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy