Attack Type: WPAD Man in the Middle

  • Home
  • /
  • Course
  • /
  • Attack Type: WPAD Man in the Middle

Attack Type: WPAD Man in the Middle


Course Overview

In this scenario, a Man-in-the-Middle (MiTM) attack is executed on the network where the attacker impersonates a legitimate proxy in the segment in order to deceive victim hosts. In this complex scenario, participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment, leaving the organization in a more vulnerable position.


Details