Posted on August 10, 2018 by admin[PDF] Practical man-in-the-middle attacks in computer networkshttp://thehiddenwiki.pw/files/hacking/thesis.pdf