Stephen, an attacker, decided to gain access to an organization's server. He identified a user with access to the remote server. He used sniffing programs to gain the user's credentials and captured the authentication tokens transmitted by the user. Then, he transmitted the captured tokens back to the server to gain unauthorized access.
Identify the technique used by Stephen to gain unauthorized access to the target server.
Alesia
25 days agoGraham
4 days agoRonnie
10 days agoDelisa
1 months agoMarlon
17 days agoWerner
20 days agoKayleigh
1 months agoLisbeth
21 days agoAnnice
1 months agoSophia
2 months agoNickie
2 months agoSelma
2 months agoDoyle
2 months ago