This lab required the group to compromise mutual authentication between two parties via two techniques: an ARP cache poisoning and a Man-In-the-Middle Attack.