December 2017
Intermediate to advanced
410 pages
11h 5m
English
In the following diagram, we can see that a user is sending their username and password in plaintext to a Web Server for authentication over a network.
There is an Attacker sitting between them doing a MITM attack and storing all the credentials he finds over the network to a file:

Read now
Unlock full access