John works as a professional Ethical Hacker. He is assigned a project to test the security of
www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the
weare- secure network and intercept a conversation between two employees of the company
through session hijacking. Which of the following tools will John use to accomplish the task?
A.
Ethercap
B.
Tripwire
C.
IPChains
D.
Hunt
Explanation: