Video upload date:  · Duration: PT1H46M27S  · Language: EN

Emily connected her Android device to a eccouncil video

ethical-hacker video for emily connected her Android device to a public computer that had been compromised by Alex, an attacker. Upon establishing the

This is a dedicated watch page for a single video.

Full Certification Question

Emily connected her Android device to a public computer that had been compromised by Alex, an attacker. Upon establishing the connection with the public computer, Emily activated the Android Wi-Fi sync feature on the computer, allowing the device to maintain communication with it even after being physically disconnected. Now, Alex gains entry to Emily's Android device through the compromised computer and can observe and access all of Emily's activities on the device, even after it is out of the communication range. Which of the following attacks is executed by Alex in the above scenario?