Lab 6.2 Analysis Questions
1. Aman-in-the-middle attack poses what kind of threat, to which characteristic of data, and in what state? 2. If you suspect you are the victim of a man-in-the-middle attack, what steps can you take to determine whether you are? 3. What steps would you take to use Ettercap to execute a man-in-the-middle attack? 4. Use […]