Problem Statement
In a man-in-the-middle (MITM) attack, what does the attacker do?
Explanation
A MITM attack occurs when an attacker secretly places themselves in the communication path between two parties—this can allow eavesdropping, data theft or modification of messages. It is a critical vulnerability scenario in penetration testing interviews. :contentReference[oaicite:6]{index=6} Understanding this helps you propose encryption, certificate validation or VPN solutions for defence.