Which of the following attacks allows attacker to acquire access to the communication channels between the victim and server to extract the information?