attacco man-in-the-middle
Man-in-the-Middle-Angriff
attaque de l’homme du milieu
Cyberangriff, bei dem sich der Angreifer unbemerkt in den Kommunikationskanal zweier Partner hängt und dadurch deren Datenaustausch mitlesen oder verändern kann.
Cyberattack in which a hacker steals sensitive information by eavesdropping on communications between two online targets such as a user and a web application.
Cyberattaque au cours de laquelle une personne intercepte les communications entre deux parties, notamment à l'aide d'une clé cryptographique obtenue frauduleusement, ce qui lui permet de se faire passer pour l'une des parties, ou les deux, ou encore de récupérer des informations sensibles.
Attacco informatico in cui un hacker ruba informazioni sensibili intercettando le comunicazioni tra due obiettivi online come un utente e un'applicazione web.
2025-10-28T09:36:41.5561650Z
https://www.termdat.bk.admin.ch/entry/309776
IBM, What is a man-in-the-middle (MITM) attack? ([Internet, 2025-07-01](https://www.ibm.com/think/topics/man-in-the-middle))
IBM, Che cos'è un attacco man-in-the-middle (MITM)? ([Internet, 2025-07-01](https://www.ibm.com/it-it/think/topics/man-in-the-middle))
Fortinet, Man-in-the-Middle-Angriff: Arten und Beispiele ([Internet, 2025-07-02](https://www.fortinet.com/de/resources/cyberglossary/man-in-the-middle-attack))
Fortinet, Attaque de l’homme du milieu : Types et exemples ([Internet, 2025-07-02](https://www.fortinet.com/fr/resources/cyberglossary/man-in-the-middle-attack))
EXP: the attack can be made when two parties are communicating by using public or shared keys to have a secure communication; In both cases, the man in the middle has to intercept the exchange of the keys and establish two separate connections with different keys to both users. He then can read and alter all the messages and usually forwards them to the intended user by faking the key
Universität Bern, Man in the middle (MITM) attack ([Internet, 2025-07-01](http://home.inf.unibe.ch/~rvs/teaching/cn%20applets/Man_In_The_Middle_Attack_1/Man%20in%20the%20middle%20attack.pdf))
IBM, What is a man-in-the-middle (MITM) attack? ([Internet, 2025-07-01](https://www.ibm.com/think/topics/man-in-the-middle))
nach MELANI, Informationssicherung - Lage in der Schweiz un International, Halbjahresbericht 2018/I, S. 57 ([Internet, 2025-07-01](https://www.newsd.admin.ch/newsd/message/attachments/54408.pdf))
d'après Le Grand dictionnaire terminologique, "attaque par interception" ([Internet, 2025-07-01](https://vitrinelinguistique.oqlf.gouv.qc.ca/fiche-gdt/fiche/26542694/attaque-par-interception))
secondo IBM, Che cos'è un attacco man-in-the-middle (MITM)? ([Internet, 2025-07-01](https://www.ibm.com/it-it/think/topics/man-in-the-middle))