There are multiple types of attack which are possible on the data when the data is being transferred over the network from one machine to another. One such attack is called ‘Man-In-The-Middle’. What is it and what are the different types? (Other type of attacks may be ‘IP Spoofing’, eavesdropping etc.)
A man-in-the-middle attack occurs when someone is actively monitoring, capturing, and controlling the communication between two computers transparently (without the knowledge of sender or receiver). For example, the attacker can modify the data, replay it, or just listen to it.
When computers are communicating at low levels of the network layer, the computers might not be able to determine with whom they are exchanging data.
Man-in-the-middle attacks are like someone assuming your identity in order to read your message. The person on the other end might believe it is you because the attacker might be actively replying as you to keep the exchange going and gain more information.
Following pictures, represent the effects of Man-In-Middle Attack:
So the Man-In-The-Middle may be