A man in middle attack, generally occurs when attackers are able to place themselves in the middle of two other hosts that are communicating in order to view and/or modify the traffic.It is also called as Bucket-Bridge Attack.
This will do by making sure that all communications going to or from the target host is routed through the attacker's host.
Then the attacker can be able to observe all traffic before transmitting it and can actually modify or block traffic. To the target host, communication is occurring normally, since all expected replies are received.
This will do by making sure that all communications going to or from the target host is routed through the attacker's host.
Then the attacker can be able to observe all traffic before transmitting it and can actually modify or block traffic. To the target host, communication is occurring normally, since all expected replies are received.