One of the most successful vectors for gaining control of customer information and resources is through man-in-the-middle attacks.
In this class of attack, the attacker situates himself between the customer and the real web-based application, and proxies all communications between the systems.
From this vantage point, the attacker can observe and record all transactions. This form of attack is successful for both HTTP and HTTPS communications.
For man-in-the-middle attacks to be successful, the attacker must be able to direct the customer to their proxy server instead of the real server.
Lets look at what kind of MITM attacks can be used and under what scenario.