Stephen, an attacker, decided to gain access to an organization's server. He identified a user with access to the remote server. He used sniffing programs to gain the user's credentials and captured the authentication tokens transmitted by the user. Then, he transmitted the captured tokens back to the server to gain unauthorized access.
Identify the technique used by Stephen to gain unauthorized access to the target server.
Barney
4 months agoGilbert
5 months agoJolene
5 months agoCoral
5 months agoLilli
5 months agoAngella
6 months agoMalcolm
6 months agoTuyet
6 months agoChaya
6 months agoKenneth
6 months agoHelga
6 months agoCarlene
6 months agoLucina
6 months agoMeaghan
6 months agoAdria
6 months agoEva
6 months agoCecil
6 months agoAlesia
11 months agoRonnie
10 months agoMarcos
10 months agoJacki
10 months agoEdelmira
10 months agoCarolann
10 months agoFrancesco
10 months agoChaya
10 months agoGraham
10 months agoRonnie
11 months agoDelisa
12 months agoJosephine
10 months agoLasandra
10 months agoCordelia
10 months agoMarlon
11 months agoWerner
11 months agoKayleigh
12 months agoSherell
10 months agoLuz
10 months agoLisbeth
11 months agoAnnice
11 months agoSophia
12 months agoNickie
1 year agoSelma
1 year agoDoyle
1 year ago