← See all resources
Adversary-in-the-Middle Attack
🎭Attack Anatomy • Attack Types

Adversary-in-the-Middle Attack

How attackers intercept sessions and credentials using AITM attacks.

Tags

AITMSession Hijacking
Download infographic

File: SecPro-ataque-aitm.gif

More from Attack Anatomy • Attack Types

Explore more infographics

View full catalog

Need help with your cybersecurity? 💬