One researcher intercepted 200 requests for SSL encrypted pages over 20 hours, including 114 Yahoo! credentials, 50 Gmail credentials and 16 credit-card numbers. This is an especially distressing issue as this is the major form of security used on the web today. Recently, there has been alot of press about MITM attacks defeating even SSL security. A more recent and famous example is The Mitnick attack, a man in the middle attack taking advantage of the structure of IP to establish the trusted connections. Perhaps the earliest reference was a paper showing the possibility of IP spoofing in BSD Linux. Historically, several different man in the middle attacks have been described. If challenge questions are used, the MITM attacker can simply observe the challenge question and present it to the user, replaying the response to the legitimate site.If tokens are used, the MITM attacker can intercept and replay the one-time password before the token times out.The attacker may or may not modify the communications. Bob then replies to Alice which is also intercepted by the attacker, and then forwarded to Alice. Alice sends a communication to Bob, which is intercepted by an attacker, and then forwarded on to Bob.