Learning Goals

In this project, you’ll take on the role of a cybersecurity analyst to investigate a Man-in-the-Middle (MITM) attack using real-world network forensics techniques.

You will:

  • Analyze packet capture (PCAP) files using tools like Wireshark and pyShark.
  • Identify MITM techniques and behaviors across the OSI layers.
  • Gain familiarity with application-layer protocols such as HTTP, IRC and others.
  • Interpret protocol behavior through RFC documents to understand standards and anomalies.

Tools You’ll Use

Protocols You’ll Explore

RFCs You Should Review

As this is a graduate-level course, you’re expected to explore protocol specifications via official RFCs:

To deepen your understanding of MITM techniques, consider reviewing:

✅ Final Deliverables

There are two deliverables for this project, each submitted via Gradescope:

  1. Man in the Middle – PCAP Analysis
    • A single JSON file named project_mitm.json.
    • A template will be provided in the next section.
  2. Man in the Middle – Programming Assignment
    • Write a small program that automates part of your analysis using pyShark/tshark.
    • This encourages scripting for repeatable and scalable workflows.

Ready to dive in? Head to the background and setup to begin your investigation.

Table of contents