Fill in the blank: To exploit session eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for fill in the blank: To exploit session hijacking effectively, attackers commonly use ________ tools to sniff network traffic and capture

Full Certification Question

Fill in the blank: To exploit session hijacking effectively, attackers commonly use ________ tools to sniff network traffic and capture session cookies.