This is a dedicated watch page for a single video.
Robert, a professional hacker, was performing a session hijacking attack on a target organization. In this process, he installed a tool on an Android device and connected it to the organization’s network to obtain the session IDs of active users on the Wi-Fi network. He used those session IDs to access a website as an authorized user. Which of the following tools did Robert employ in the above scenario?