See MitM for more details.
The following security tools are linked to Man-in-the-Middle attack and are worth investigating.