Abstract
In this hands-on training, participants will learn how to design and build a full-fledged Man-In-The-Middle (MITM) tool using the Rust programming language. The course provides a practical dive into low-level networking, from Layer 2 packet crafting to HTTP/TLS interception.
Participants will progressively develop a custom MITM tool capable of scanning local networks, performing ARP spoofing attacks, and intercepting network traffic across multiple protocol layers. We'll explore both active and passive interception techniques, including DNS spoofing and proxy-based HTTP/TLS manipulation.
This training is ideal for developers, security engineers, and pentesters who want to gain deeper insight into how network traffic flows — and how it can be intercepted.