kb/data/developer.mozilla.org/en-US/docs/Glossary/MitM-0.md

10 KiB
Raw Blame History

title chunk source category tags date_saved instance
MitM - Glossary | MDN 1/3 https://developer.mozilla.org/en-US/docs/Glossary/MitM reference web, html, css, javascript, documentation 2026-05-05T05:37:56.172396+00:00 kb-cron

MDN HTML HTML: Markup language

HTML reference

HTML guides

Markup languages

CSS CSS: Styling language

CSS reference

CSS guides

Layout cookbook

JavaScriptJS JavaScript: Scripting language

JS reference

JS guides

Web APIs Web APIs: Programming interfaces

Web API reference

Web API guides

All All web technology

Technologies

Topics

Learn Learn web development

Frontend developer course

Learn HTML

Learn CSS

Learn JavaScript

Tools Discover our tools

About Get to know MDN better

Blog

  1. Glossary
  2. MitM

MitM

A manipulator-in-the-middle attack (MitM) intercepts a communication between two systems. For example, a Wi-Fi router can be compromised. Comparing this to physical mail: If you're writing letters to each other, the mail carrier can intercept each letter you mail. They open it, read it, eventually modify it, and then repackage the letter and only then send it to whom you intended to sent the letter for. The original recipient would then mail you a letter back, and the mail carrier would again open the letter, read it, eventually modify it, repackage it, and give it to you. You wouldn't know there's a manipulator in the middle in your communication channel the mail carrier is invisible to you and to your recipient. In physical mail and in online communication, MITM attacks are tough to defend. A few tips:

  • Don't just ignore certificate warnings. You could be connecting to a phishing server or an imposter server.
  • Sensitive sites without HTTPS encryption on public Wi-Fi networks aren't trustworthy.
  • Check for HTTPS in your address bar and ensure encryption is in-place before logging in.

In this article

See also