Figure 2.17a: Attempting a Man-in-the-Middle Attack

[Figure 2.17a: Attempting a Man-in-the-Middle Attack.]

The evil interloper attempts to interpose itself between the legitimate client and server.

Figure 2.17b: A Successful Man-in-the-Middle Attack

[Figure 2.17b: Successful Man-in-the-Middle Attack.]

If the evil interloper succeeds, the server will not notice that the "real" client is gone. The evil interloper may also try to impersonate the server to the client.

[W3C Validated] $Revision: 1.1 $ 
Copyright © 2003 Christopher R. Hertel