During a successful man-in-the-middle attack, which two of the following actions is an attacker most likely to perform?
- Eavesdrop on traffic passing between hosts
- Induce a buffer overflow on multiple hosts
- Modify data passing between hosts
- Use ping sweeps and port scans to discover the network
Explanation: Once an attacker is in position in a man-in-the-middle attack, traffic between hosts can be passively inspected and actively modified. This type of attack does not lend itself to inducing buffer overflows or using sweeps and scans.
Please login or Register to submit your answer