Man in the Middle Attacks
T-Level Cyber Security - Man in the Middle Attacks - Includes an imposter type game
Created by Paul Shaddick
last edited Apr 05 2019 by Paul Shaddick
- What is a ‘Man in the Middle’ attack?
- Mail Redirection
- Evil Twin (Captive Portal)
- ARP Cache Poisoning
- Slide 10 is intended to be printed and cut up for use by groups of 4 (or 3 excluding Dave). It’s a ‘find the imposter’ type game. Students discuss after playing to consider how well it fits the MITM definition.
Duration: 45-60 minutes
Teaches: Network security threats, MITM, game