Q: 8
Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use
these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept
communications between the two entities and establish credentials with both sides of the
connections. The two remote ends of the communication never notice that Eric is relaying the
information between the two. What would you call this attack?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.