Stephen, an attacker, decided to gain access to an organization's server. He identified a user with access to the remote server. He used sniffing programs to gain the user's credentials and captured the authentication tokens transmitted by the user. Then, he transmitted the captured tokens back to the server to gain unauthorized access.
Identify the technique used by Stephen to gain unauthorized access to the target server.
Alesia
2 months agoRonnie
1 months agoMarcos
1 months agoJacki
1 months agoEdelmira
1 months agoCarolann
1 months agoFrancesco
1 months agoChaya
2 months agoGraham
2 months agoRonnie
2 months agoDelisa
3 months agoJosephine
1 months agoLasandra
1 months agoCordelia
1 months agoMarlon
2 months agoWerner
2 months agoKayleigh
3 months agoSherell
1 months agoLuz
1 months agoLisbeth
2 months agoAnnice
3 months agoSophia
3 months agoNickie
3 months agoSelma
4 months agoDoyle
4 months ago