Definīcija: A technique where adversaries position themselves between two or more networked devices and abuse features of common networking protocols that can determine the flow of network traffic to force a device to communicate through an adversary-controlled system so they can collect information or perform additional actions.