Intercept or modify data with a MitM attack

Man in the Middle (MitM) attacks against (cryptographic or application layer) protocols allow an adversary to proxy communication between two parties allowing any data to either be read or altered. Can be done after a session has been established, but is easier done before. When used for BGP session hijacking, DNS spoofing is likely not very useful because of hostnames not being used in router configurations.


1 Gain write access to network segment of one or more peers (AND)

2 Subvert address infrastructure (AND)

3 Proxy sessions