This report evaluates the Man-In-The-Middle (MitM) attack, its types, techniques, and prevention methods. It also includes recent examples of the attack. The MitM attack happens when an attacker gets himself between the transaction or communication process that is continued between the client and a server or the authorities and stakeholders related to the organization.