Why not set this up yourself in a virtual lab and demonstrate the scenarios you just listed? Put two victim hosts on the network, and then with a third attacker host,
perform your MITM attack.
Thanks for suggestion! I did do several fire drills in the past, where I would change keys and wait for people to reach out. At the beginning of the semester, almost nobody would; by the end, over 80 % of the class would reach out prior to connecting to our shared infrastructure. But I thought that having a real-world smoking gun would be even better motivation to think about it. Sort of "don't be this poor guy" kind of thing. I've also been thinking about actually MitM-ing them myself, and probably will, but I am not sure how far I want to go :).
hxelk1|2 years ago
toast0|2 years ago