In this blog we have structured this into three parts The Act, The Analysis and The Detection and go through each part in very simplistic way to understand and approach them.
The Act talks about Modern authentication abuse using AITM
The Analysis t...