The IT Law Wiki
Advertisement

Definition[]

Another type of system reconfiguration attack is a proxy attack. The attacker installs a proxy through which the user's network traffic will be passed. The attacker can glean confidential information from the traffic while retransmitting it back and forth between the victim and a remote website. This is a form of a man-in-the-middle attack.

Source[]

Advertisement