Person in the Middle
ID: | TEQ-005 | |
Phase(s): | Resource Development | |
Tactic(s): | Credential Acquisition | Payment Detail Acquisition |
A person in the middle attack is when the attacker intercepts traffic between two hosts; this allows the attacker to listen to the traffic that is being sent from host A to host B and to manipulate the data.