Examining man-in-the-middle attacks