Which file does the attacker need to modify?

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to
“www.MyPersonalBank.com”, that the user is directed to a phishing site.
Which file does the attacker need to modify?

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to
“www.MyPersonalBank.com”, that the user is directed to a phishing site.
Which file does the attacker need to modify?

A.
Hosts

B.
Sudoers

C.
Boot.ini

D.
Networks

Explanation:
The hosts file is a computer file used by an operating system to map hostnames to IP addresses. The hosts file
contains lines of text consisting of an IP address in the first text field followed by one or more host names.
https://en.wikipedia.org/wiki/Hosts_(file)



Leave a Reply 0

Your email address will not be published. Required fields are marked *