your victims network traffic, you win ! Geographically proximate attacks include : DNS Hijacking, Rogue WiFi AP or cellular base station, ARP poisoning, etc.. ! Completely remote attacks could be performed by stronger adversaries. Examples include: ISP packet injection (Verizon), Quantum insert (NSA), National Firewall (ex. Used to DOS Github) ! My test setup consisted of a Linux VM running hostapd in which I transparently redirected HTTP traffic to mitmproxy. In this way, a vulnerable device only has to connect to the WiFi access point to get owned.