Thomas, an employee of an organization, is restricted to access specific websites from his office system. He is trying to obtain admin credentials to remove the restrictions. While waiting for an opportunity, he sniffed communication between the administrator and an application server to retrieve the admin credentials. Identify the type of attack performed by Thomas in the above scenario.
Watchman_Bonda
2 months, 3 weeks agosaykre
5 months, 1 week agoRSMCT2011
1 year agoAlvesbtc
1 year, 1 month agowalexo
1 year, 4 months ago