What would you call this attack?

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learned how to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric was relaying the information between the two. What would you call this attack?

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learned how to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric was relaying the information between the two. What would you call this attack?

A.
Man-in-the-middle

B.
Interceptor

C.
Poisoning Attack

D.
Arp Proxy

Explanation:
A man-in-the-middle attack ( MITM ) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised.



Leave a Reply 0

Your email address will not be published. Required fields are marked *