ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 45 Topic 5 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 45 Topic 5 Discussion

EC0-350 Exam Topic 5 Question 45 Discussion:
Question #: 45
Topic #: 5

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two.

What would you call this attack?


A.

Interceptor


B.

Man-in-the-middle


C.

ARP Proxy


D.

Poisoning Attack


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.