AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: The attacker enters its malicious data into eccouncil video

Question 1 Be Honest
« Back   Next ethical-hacker Question »
Answer

Full Certification Question

The attacker enters its malicious data into intercepted messages in a TCP session since source routing is disabled. He tries to guess the responses of the client and server. What hijacking technique is described in this example?