Problem
Man-in-the-middle (MITM) Attacks
• Describe in detail how an attacker could carry out a MITM attack on users using an airport's free WiFi network and steal their login credentials (for example for Facebook). Assume that users will try to use HTTPS to access web services but otherwise there are no specific mitigations against MITM attacks present in the network or on the user's machine (including the web browser). For full marks your description needs to include and describe in sufficient detail all the necessary steps the attacker needs to execute.
• Explain THREE different techniques that could be applied to prevent or mitigate this attack.