Samuel, a professional hacker, monitored and intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN,
Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with a packet having an incremented ISN. Consequently,
Bob's connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob.
What is the type of attack performed by Samuel in the above scenario?
cerzocuspi
Highly Voted 3 years, 6 months agoLoneStarChief
Highly Voted 3 years agoBallCS
Most Recent 3 months agolearn_to_ethic
10 months agovinothkumars
1 year, 1 month agoPikuuu
1 year, 3 months agovictorfs
1 year, 5 months agoBob_234
1 year, 7 months agojosevirtual
1 year, 11 months agoDar87
1 year, 11 months agoDaniel8660
2 years agoebuAkif
2 years agouday1985
2 years, 1 month agoAisha86
2 years, 1 month agoflinux
2 years, 1 month agocazzobsb
2 years, 6 months agojosek19
2 years, 6 months ago