Bob has chosen to collect data for identity eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for bob has chosen to collect data for identity theft within the target organization. His strategy involves redirecting the organization's

Full Certification Question

Bob has chosen to collect data for identity theft within the target organization. His strategy involves redirecting the organization's web traffic to a malicious website. To achieve this, he intends to exploit vulnerabilities in the DNS server software and manipulate the original IP address of the target website to that of the malicious site. What technique is Bob planning to employ?