Packets of digital data travel from source to destination through “hops,” or stops along the networking path. Data can travel in a single hop (direct) or in a multi-hop network (more than one relay). In a multi-hop network, traffic is rerouted from one gateway, router, or device to the next (somewhat akin to airline routes).
A “hop point” generally refers to a compromised connection or relay—hop—that the attacker uses to obfuscate the path of the data packet s/he wants to intercept. A hop point, therefore, is the “middle man” device.
Get the DeMISTIfying InfoSec newsletter every Tuesday!