An attacker is using a technique to intercept and alter communication between two parties who believe they are directly communicating with each other. The attacker is situated between the two parties and is relaying messages, potentially manipulating the content without their knowledge. Which of the following attacks is being described?
-
A
Phishing
-
B
Man-in-the-Middle (MitM)
-
C
DDoS
-
D
SQL Injection