Figure 2.17a: Attempting a Man-in-the-Middle Attack
The evil interloper attempts to interpose itself between the
legitimate client and server.
Figure 2.17b: A Successful Man-in-the-Middle Attack
If the evil interloper succeeds, the server will not notice that
the "real" client is gone. The evil interloper may also try
to impersonate the server to the client.