ethical-hacker video for in the course of executing an attack, Alex, an adept attacker, deploys a counterfeit communication tower strategically positioned
In the course of executing an attack, Alex, an adept attacker, deploys a counterfeit communication tower strategically positioned between two legitimate endpoints to deceive an unsuspecting victim. Leveraging this virtual tower, Alex disrupts the ongoing data transmission between the user and the genuine tower, endeavoring to hijack an active session. Subsequently, Alex intercepts the user's request, gaining the ability to manipulate the traffic through the virtual tower. Exploiting this control, Alex redirects the victim to a malicious website, thereby exploiting the compromised session for malicious purposes. Which of the following is the attack executed by Alex in the above scenario?