Thomas, an employee of an organization, is restricted to access specific websites from his office system. He is trying to obtain admin credentials to remove the restrictions. While waiting for an opportunity, he sniffed communication between the administrator and an application server to retrieve the admin credentials. Identify the type of attack performed by Thomas in the above scenario.
Kreno_Maze
4 months agoWatchman_Bonda
7 months, 3 weeks agosaykre
10 months, 1 week agoRSMCT2011
1 year, 5 months agoAlvesbtc
1 year, 6 months agowalexo
1 year, 9 months ago