Paper 4 | MITM Methods

I need support with this Computer Science question so I can learn better.

Research MITM methods and complete a 2 pages narrative (double-spaced) discussing the following, at a minimum:

  • What is a MITM attack?
  • What type of information can the attacker gather?
  • Can the attacker alter information? If so, what would be the benefit of this?
  • What is ARP spoofing?
  • What is DNS poisoning?
  • Can digital certificates be fooled with a MITM attack?
  • If you were to conduct a MITM attack, how would you go about it?