Figure 2.17a: Attempting a Man-in-the-Middle Attack
The evil interloper attempts to interpose itself between the legitimate client and server.
Figure 2.17b: A Successful Man-in-the-Middle Attack
If the evil interloper succeeds, the server will not notice that the "real" client is gone. The evil interloper may also try to impersonate the server to the client.
$Revision: 1.1 $
Copyright © 2003
Christopher R. Hertel