Which of the following protocols do MOST MITM attacks utilize?