In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access.

Posted by: Pdfprep Category: CEH-001 Tags: , ,

In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access.
A . Token Injection Replay attacks
B . Shoulder surfing attack
C . Rainbow and Hash generation attack
D . Dumpster diving attack

Answer: A

Leave a Reply

Your email address will not be published.