ethical-hacker video for fill in the blank: To exploit session hijacking effectively, attackers commonly use ________ tools to sniff network traffic and capture
Fill in the blank: To exploit session hijacking effectively, attackers commonly use ________ tools to sniff network traffic and capture session cookies.