An attack in which communication between two systems is intercepted by a third system. The attacker acts as a proxy, able to read, modify, insert and delete data in the intercepted communication channel.
An attack in which communication between two systems is intercepted by a third system. The attacker acts as a proxy, able to read, modify, insert and delete data in the intercepted communication channel.