In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer
However, host A can continue to receive data as long as the SYN sequence numbers of transmitted packets from host B are lower than the packet segment containing the set FIN flag.
Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?