Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack | IEEE Conference Publication | IEEE Xplore