Which of the following attacks are you performing?

You are using the dsniff tool to intercept communications between two entities and establish
credentials with both sides of the connections. These entities do not notice that you were retrieving
the information between these two. Which of the following attacks are you performing?

You are using the dsniff tool to intercept communications between two entities and establish
credentials with both sides of the connections. These entities do not notice that you were retrieving
the information between these two. Which of the following attacks are you performing?

A.
Session hijacking

B.
DoS

C.
ARP poisoning

D.
Man-in-the-middle

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *