List of questions
Related questions
Question 84 - ECSS discussion
Stephen, an attacker, decided to gain access to an organization's server. He identified a user with access to the remote server. He used sniffing programs to gain the user's credentials and captured the authentication tokens transmitted by the user. Then, he transmitted the captured tokens back to the server to gain unauthorized access.
Identify the technique used by Stephen to gain unauthorized access to the target server.
A.
Brute-force attack
B.
Internal monologue
C.
SQL injection
D.
Replay attack
Your answer:
0 comments
Sorted by
Leave a comment first