Attack Type: WPAD Man in the Middle
Course Overview
In this scenario, a Man-in-the-Middle (MiTM) attack is executed on the network where the attacker impersonates a legitimate proxy in the segment in order to deceive victim hosts. In this complex scenario, participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment, leaving the organization in a more vulnerable position. |