During a network security assessment, you are tasked with intercepting communications between two hosts to capture sensitive data being transmitted. What type of attack would allow an unauthorized party to insert themselves into this communication without the hosts' knowledge?
On-path attack
Side-channel attack
ARP poisoning
Replay attack