I need support with this Computer Science question so I can learn better.
Research MITM methods and complete a 2 pages narrative (double-spaced) discussing the following, at a minimum:
- What is a MITM attack?
- What type of information can the attacker gather?
- Can the attacker alter information? If so, what would be the benefit of this?
- What is ARP spoofing?
- What is DNS poisoning?
- Can digital certificates be fooled with a MITM attack?
- If you were to conduct a MITM attack, how would you go about it?