Watch this video on YouTube
The malicious actor Victor has implanted a remote access Trojan on a host. He aims to ensure that when a victim tries to visit "www.site.com," the user is redirected to a phishing site. In this scenario, which file should Victor modify?