Man-in-the-middle attacks seriously affect websites since we can eavesdrop while remote and undetected.
So, how could we place ourselves in the middle of website communication?
Yep! We can use all of these methods to intercept and, possibly, alter website traffic.
Couldn't all of these methods intercept unsecured website traffic?