The IT Law Wiki

Proxy attack

32,066pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

Another type of system reconfiguration attack is a proxy attack. The attacker installs a proxy through which the user's network traffic will be passed. The attacker can glean confidential information from the traffic while retransmitting it back and forth between the victim and a remote website. This is a form of a man-in-the-middle attack.

Source Edit

Also on Fandom

Random Wiki