Advantages: ability to modify traffic and disable features like encryption or compression. Easier to analyze and exploit a network protocol.
Disadvantages: more difficult, require rerouting the application's traffic. Can be easy to mess up.
MitM attack on network traffic through a network Proxy.
sometimes will run into problems like we know the ip address, but we do not know the dest_ports the application might be using with that addr. Especially if the application contains complex functions running over multiple different service connections. For ex. Remote Procedure Call(RPC) and Common Object Request Broker Architecture(COBRA)
This procotol makes an initial network connection to a broker, which acts as a direcotry of available services. As the second connection is then made to the requested service over an instance-specific TCP port.