A man in the middle consists of getting into the communication between two devices so that all the traffic passes through us. This allows the theft of data, reading and modification of communications.
In this post we will make modifications to the answers that the victims receive.
Continue reading