Adversary-in-the-Middle (AiTM)

AiTM interposes on a communication path to intercept, relay, or modify traffic between parties.

#network#capec

Last updated: 2025-09-02T00:00:00.000Z

Evidence

CAPEC CAPEC-94 Normative evidence
capec.mitre.org

Mappings

CAPEC-94

More context

Strong authentication, TLS with HSTS, and certificate validation reduce exposure to interception and relaying.