Man in the Middle (MITM)

Adversaries with privileged network access that seek to modify network traffic in real time using man-in-the-middle (MITM) attacks. This type of attack allows the adversary to intercept traffic to and/or from a particular device on the network. The adversary might block, log, modify, or inject traffic into the communication stream. Address Resolution Protocol (ARP) poisoning and the use of a proxy is a typical attach vector.

Scroll to Top