Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "MITM attack"
From NetSec
WillieArce (Talk | contribs) m |
|||
Line 1: | Line 1: | ||
<b>M</b>an <b>I</b>n <b>T</b>he <b>M</b>iddle attack | <b>M</b>an <b>I</b>n <b>T</b>he <b>M</b>iddle attack | ||
− | A method to forcibly route the traffic between two hosts so that it can be sniffed between them | + | A method to forcibly route the traffic between two hosts so that it can be [[sniffing|sniffed]] between them. |
[[Category:Attacks]][[Category:Network Security]] | [[Category:Attacks]][[Category:Network Security]] |
Revision as of 05:49, 13 March 2012
Man In The Middle attack
A method to forcibly route the traffic between two hosts so that it can be sniffed between them.