@feld Adversary-in-the-Middle.You take control of something like a phishing site, and tweak their attack into something that will better suit yourself.One attacker hiding behind another.