Stephen, an attacker, decided to gain access to an organization's server. He identified a user with access to the remote server. He used sniffing programs to gain the user's credentials and captured the authentication tokens transmitted by the user. Then, he transmitted the captured tokens back to the server to gain unauthorized access.
Identify the technique used by Stephen to gain unauthorized access to the target server.
Barney
3 months agoGilbert
3 months agoJolene
3 months agoCoral
4 months agoLilli
4 months agoAngella
4 months agoMalcolm
4 months agoTuyet
4 months agoChaya
5 months agoKenneth
5 months agoHelga
5 months agoCarlene
5 months agoLucina
5 months agoMeaghan
5 months agoAdria
5 months agoEva
5 months agoCecil
5 months agoAlesia
10 months agoRonnie
8 months agoMarcos
8 months agoJacki
8 months agoEdelmira
8 months agoCarolann
9 months agoFrancesco
9 months agoChaya
9 months agoGraham
9 months agoRonnie
9 months agoDelisa
10 months agoJosephine
8 months agoLasandra
9 months agoCordelia
9 months agoMarlon
9 months agoWerner
9 months agoKayleigh
10 months agoSherell
8 months agoLuz
8 months agoLisbeth
9 months agoAnnice
10 months agoSophia
10 months agoNickie
11 months agoSelma
11 months agoDoyle
11 months ago