Adversary-in-the-Middle (AiTM)
AiTM interposes on a communication path to intercept, relay, or modify traffic between parties.
#network#capec
Last updated: 2025-09-02T00:00:00.000Z
Evidence
CAPEC CAPEC-94 Normative evidence
Mappings
CAPEC-94
More context
Strong authentication, TLS with HSTS, and certificate validation reduce exposure to interception and relaying.