List of questions
Related questions
Question 52 - ECSS discussion
Bruce, a professional hacker, targeted an OT network. He initiated a looping strategy to recover the password of the target system. He started sending one character at a time to check whether the first character entered is correct: If so, he continued the loop for consecutive characters. Using this technique. Bruce identified how much time the device takes to finish one complete password authentication process, through which he determined the correct characters in the target password.
Identify the type of attack launched by Bruce on the target OT network.
A.
Code injection attack
B.
Buller overflow attack
C.
Reconnaissance attack
D.
Side-channel attack
Your answer:
0 comments
Sorted by
Leave a comment first