The main goal of this attack is to acquire personal information. In both situations, the attacker pretends to be one or both the legitimate participants making it appear as if a normal exchange of information is underway. They can position themselves in a conversation between a user and an application or between two applications communicating with each other. In cryptography and computer security, a Man In The Middle Attack is a form of eavesdropping attack where an attacker position themselves between an existing conversation or data transfer.
0 Comments
Leave a Reply. |