Introduction
Imagine sending a private letter to a friend, but someone secretly reads and changes it before it reaches them. This problem happens online too, where attackers intercept communication between two people without their knowledge.
Imagine two friends passing notes in class. A sneaky classmate grabs the note, reads it, changes the message, and then passes it on. Both friends think they are communicating directly, but the classmate controls the conversation.
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ Sender │───────▶│ Attacker │───────▶│ Receiver │
│ (User A) │ │ (Man-in-the-│ │ (User B) │
│ │ │ Middle) │ │ │
└─────────────┘ └─────────────┘ └─────────────┘
│ │ │
│◀─────────────────────┼─────────────────────▶│
│ │ │