Man In The Middle attack
A method to forcibly route the traffic between two hosts so that it can be sniffed between them. Normal traffic flows on a network as follows:
Client Machine --> Router --> [Other Routing Hops] --> Destination
Man in the middle attacks allow an attacker to tell remote machines or routers on or for subnets or ethernet networks (switches or hubs) that the traffic routed to and from the victim IP address must pass through the attacker's system.
[Victim] Poisoned Machine --> [Attacker] Fake Router --> [Internet] Upstream Router --> [Other Hops] --> Destination
This exploitation in the internet protocol can cause high packet loss when the amount of traffic hijacked by the attack exceeds the maximum throughput of networking hardware on the attacker's machine.
|This article contains too little information, it should be expanded or updated.|
|Things you can do to help: