MITM (man-in-the-middle) attack
A class of attacks involving an intermediary acting for its own benefit: after inserting itself between two parties exchanging data, a third participant receives unauthorized access to their traffic with the ability to do virtually anything with it. The intermediary makes effort to hide itself in order not to evoke any legitimate parties’ suspicions of breaching the privacy and integrity of their traffic.
Other terms in this category
UDP FloodTeardrop AttackVoIP floodMS SQL reflection DDoS attackCharGEN floodSNMP reflection attackSIP malformed attackSYN Flood, or SYN AttackMITM (man-in-the-middle) attackIP Null AttackDNS AmplificationNTP floodMemcached DDoS attackRecursive HTTP GET floodHTTP floodSlowloris or session attacksRST/FIN FloodSYN/ACK FloodIP Fragmentation AttackWhat Is a Ping Flood?What is an ICMP Flood Attack?
We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy