Person in the Middle
| ID: | TEQ-005 | |
| Phase(s): | Resource Development | |
| Tactic(s): | Credential Acquisition | Payment Detail Acquisition |
A person in the middle attack is when the attacker intercepts traffic between two hosts; this allows the attacker to listen to the traffic that is being sent from host A to host B and to manipulate the data.