Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique.