ethical-hacker video for the malicious hacker Rajoo has deployed a remote access Trojan on a host. To ensure that a victim visiting "www.website.com" is
The malicious hacker Rajoo has deployed a remote access Trojan on a host. To ensure that a victim visiting "www.website.com" is redirected to a phishing site, which file should he modify?