A threat where the attacker intercepts communications between two systems by either:
- Creating fake AP
- Using a sniffer
- Using ARP Poisoning
- Using Malware to setup a Proxy Server
A threat where the attacker intercepts communications between two systems by either: