But, here’s your password. Reset it, maybe? Everyone thinks they know about the Man in the Middle. Most places think as long as they have SSL, they’re immune. Attackers know better. We’ll demonstrate implications of Man in the Middle vulnerability that go beyond the 101. We’ll show how layer 2 weaknesses can be turned into corporate compromise by demonstrating advanced MitM techniques and talk about how to protect yourself against these types of attacks. This will be a demonstration of practical exploitation using Ettercap, Cain and Abel, dsniff, Metasploit, BeEF and more. The goal of this presentation is to introduce attack methodologies to get you thinking about weaknesses in your infrastructure and what measures you can take to protect yourself.