In a man-in-the-middle attack an attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems, reading or in some cases even changing the data and then sending the dato on.
- Commonly can create a rogue WAP and gather info, passwords, shared keys, or other sensative info.
- Commonly perpatrated using ARP poisoning