Prepare a simple report to explain how to run a man-in-the-middle attack in a wireless network. Discuss the consequence of such an attack and suggest the preventive methods.
Provide print screen if necessary. Print screen must be watermarked with your name. NO MARK will be given if you can’t prove that the print screen belongs to you.
link network
viewed
browse
in that