To implement the attack and delay detection, the attacker should modify both the installer file and the:

An attacker is attempting to insert malicious code into an installer file that is available on the internet.
The attacker is able to gain control of the web server that houses both the installer and the web page
which features information about the downloadable file. To implement the attack and delay detection,
the attacker should modify both the installer file and the:

An attacker is attempting to insert malicious code into an installer file that is available on the internet.
The attacker is able to gain control of the web server that houses both the installer and the web page
which features information about the downloadable file. To implement the attack and delay detection,
the attacker should modify both the installer file and the:

A.
SSL certificate on the web server

B.
The HMAC of the downloadable file available on the website

C.
Digital signature on the downloadable file

D.
MD5 hash of the file listed on the website



Leave a Reply 3

Your email address will not be published. Required fields are marked *

2 × 3 =


Maria

Maria

why is this answer D?

Maria

Maria

Okay I just figured it out I think. Would it be because the MD5 has many vulnerabilities?

DQ

DQ

MD5 is used to ensure the integrity of downloaded file. If the attacker changes the file, he needs to change the MD5 value too.