Man in the Middle Attack - Hsanokklis/2022-2023-Tech-journal GitHub Wiki
This is when someone is able to position themselves in a conversation between a user and an application. This can be done to eavesdrop or impersonate. The goal is the steal personal information. The most common way an attacker goes about doing this attack is making a "free Wi-Fi hotspot" that is available to the public in which anyone can join. Once someone joins that network, all the of the data being sent and received can be viewed by the attacker.
Link used: https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/