MITM basics
LAN attacks (for example, ARP poisoning)
Local to remote attacks (for example, DHCP spoofing)
Remote attacks (for example, DNS spoofing)
Programming, examples and demos
MITM advanced attacks
Filteing and injection attacks (for example, in HTTP)
Downgrade of security algorithms (for example, in SSH)
Encryption key manipulation (for example, in SSL)
Filtering and injecton attacks in secured protocols (for example, in HTTPS)
Programming, examples and demos