Q: 6
Susan has attached to her company's network. She has managed to synchronize her boss's sessions
with that of the file server. She then intercepted his traffic destined for the server, changed it the way
she wanted to and then placed it on the server in his home directory.
What kind of attack is Susan carrying on?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.