1. An attack on the authentication protocol run in which the attacker positions himself in between the claimant and verifier so that he can intercept and alter data travelling between them.
(Source: NIST SP 800-63)
2. A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data in order to masquerade as one or more of the entities involved in a communication association.
(Source: RFC 2828) |