List of questions
Related questions
Question 2 - ECSS discussion
James is a professional hacker attempting to gain access to an industrial system through a remote control device. In this process, he used a specially designed radio transceiver device to sniff radio commands and inject arbitrary code into the firmware of the remote controllers to maintain persistence.
Which of the following attacks is performed by James in the above scenario?
A.
Malicious reprogramming attack
B.
Re pairing with a malicious RF controller
C.
Command injection
D.
Abusing reprogramming attack
Your answer:
0 comments
Sorted by
Leave a comment first