Samuel, a professional hacker, monitored and intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN,
Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with a packet having an incremented ISN. Consequently,
Bob's connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob.
What is the type of attack performed by Samuel in the above scenario?
cerzocuspi
Highly Voted 3 years, 5 months agoLoneStarChief
Highly Voted 2 years, 11 months agoBallCS
Most Recent 2 months, 1 week agolearn_to_ethic
9 months, 1 week agovinothkumars
1 year, 1 month agoPikuuu
1 year, 2 months agovictorfs
1 year, 4 months agoBob_234
1 year, 6 months agojosevirtual
1 year, 10 months agoDar87
1 year, 10 months agoDaniel8660
1 year, 11 months agoebuAkif
1 year, 12 months agouday1985
2 years agoAisha86
2 years agoflinux
2 years, 1 month agocazzobsb
2 years, 5 months agojosek19
2 years, 6 months ago