Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 7 Question 65 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 65
Topic #: 7
[All CPEH-001 Questions]

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Annabelle
1 months ago
I'm going with B) Man-in-the-middle. Eric's basically the third wheel in this scenario, except he's not bringing snacks, he's just stealing everyone's login credentials. Smooth move, Eric.
upvoted 0 times
Marcos
22 days ago
Yeah, definitely B) Man-in-the-middle. Eric is sneaky intercepting those communications.
upvoted 0 times
...
...
Wilson
1 months ago
B) Man-in-the-middle is the way to go. Eric's using those Dsniff tools like a ninja, sneaking in between the two entities and intercepting their communications. It's like he's the middleman at a secret spy meeting.
upvoted 0 times
...
Javier
1 months ago
I'm going with B) Man-in-the-middle as well. I mean, it's like Eric is the bouncer at a party, checking everyone's credentials and then letting them in. Except, you know, without the party and with a lot more hacking involved.
upvoted 0 times
...
Tammara
1 months ago
Definitely B) Man-in-the-middle. Eric is essentially inserting himself into the communication channel and acting as a proxy between the two parties. This is textbook MITM.
upvoted 0 times
Hillary
5 days ago
B) Man-in-the-middle
upvoted 0 times
...
Lorrie
30 days ago
A) Interceptor
upvoted 0 times
...
...
Brock
2 months ago
I think the correct answer is B) Man-in-the-middle. Eric is intercepting and relaying the communication between the two entities without their knowledge, which is a classic man-in-the-middle attack.
upvoted 0 times
Carmela
1 months ago
B) Man-in-the-middle
upvoted 0 times
...
Kenda
1 months ago
A) Interceptor
upvoted 0 times
...
...
Jody
2 months ago
I agree with Anisha, it's definitely B) Man-in-the-middle. Eric is in the middle of the communication, manipulating the data.
upvoted 0 times
...
Anisha
2 months ago
I think it's B) Man-in-the-middle because Eric is intercepting communications without the two entities knowing.
upvoted 0 times
...
Elza
2 months ago
B) Man-in-the-middle
upvoted 0 times
...

Save Cancel