In a Man-in-the-Middle (MitM) attack, three primary participants are involved:
-
The Attacker: This individual intercepts and potentially alters the communication between the other two parties.
-
The Victim (Client): The unsuspecting user who believes they are communicating directly with the legitimate entity.
-
The Legitimate Entity (Server or Service): The intended recipient of the victim's communication, which the attacker impersonates or intercepts.
The attacker positions themselves between the victim and the legitimate entity, enabling them to eavesdrop on or manipulate the communication without either party's knowledge.