Even the wires got ears! Man in the Middle Attack using ???Kali Linux

A man-in-the-middle attack can succeed only when the attacker can impersonate each endpoint to the satisfaction of the other???it is an attack on mutual authentication (or lack thereof). Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, SSL can authenticate one or both parties using a mutually trusted certification authority.