An attacker who interposes himself in the middle of a connection.

- Stackoverflow.com Wiki
1 articles, 0 books.

This write-up will not examine any new vulnerability. Rather, it explores a common methodology used in trivially hacking iOS apps, in which you perform a man-in-the-middle (MitM) attack on yourself.