Further reading
To learn more on the subject, check out the following resources:
- Vulnerabilities in the application and transport layers: https://hub.packtpub.com/vulnerabilities-in-the-application-and-transport-layer-of-the-tcp-ip-stack/
- PTES post-exploitation: http://www.pentest-standard.org/index.php/Post_Exploitation
- MITM attacks: https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/