Man-in-the-middle attack

Places the attacker’s computer in the communication line between the server and the client. The attacker’s machine can monitor and change communications.