Jason, a renowned forensic investigator, is investigating a network attack that resulted in the
compromise of several systems in a reputed multinational’s network. He started Wireshark to capture
the network traffic. Upon investigation, he found that the DNS packets travelling across the network
belonged to a non-company configured IP. Which of the following attack Jason can infer from his
findings?
A.
DNS Redirection
B.
Session poisoning
C.
Cookie Poisoning Attack
D.
DNS Poisoning