This is a brief whitepaper discussing how to perform man-in-the-middle attacks as an exit node on TOR.
You can download it from the following link: https://packetstormsecurity.com/files/download/145492/tor-mitm.pdf
Source: https://packetstormsecurity.com/files/145492/Man-In-The-Middling-TOR.html