Alex injects malicious data into intercepted eccouncil video
ethical-hacker video for alex injects malicious data into intercepted messages within a TCP session where source routing is disabled. The attacker attempts to
Answer
          Full Certification Question
Alex injects malicious data into intercepted messages within a TCP session where source routing is disabled. The attacker attempts to predict the responses from both the client and server. Which hijacking technique is exemplified in this case?