MITM and coerced auths
Last updated
Was this helpful?
Last updated
Was this helpful?
These techniques enable attackers to redirect traffic or force targets authentications. Attackers will then be able, in certain cases, to capture credentials or relay authentications. I'm using "coerce" instead of "force" in this category's title since some technique can rely on a bit of social engineering to work.