Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Sub-techniques
T1557.001 T1557.002 T1557.003
See: MITRE ATT&CK