{"id":1532,"date":"2024-02-27T17:43:41","date_gmt":"2024-02-27T16:43:41","guid":{"rendered":"https:\/\/laokoon-security.com\/?post_type=glossar&#038;p=1532"},"modified":"2024-12-03T10:47:55","modified_gmt":"2024-12-03T09:47:55","slug":"man-in-the-middle-withm-attack","status":"publish","type":"glossar","link":"https:\/\/laokoon-security.com\/en\/glossar\/man-in-the-middle-mitm-attacke\/","title":{"rendered":"Man-in-the-middle (mitm) attack"},"content":{"rendered":"<p>An attack in which an attacker is able to intercept and manipulate communications between two parties without the parties being aware of it.<\/p>\n<p>\u2013<\/p>","protected":false},"template":"","class_list":["post-1532","glossar","type-glossar","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/glossar\/1532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/glossar"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/glossar"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=1532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}