An attacker makes use of the Beacon implant on a target system to hijack a browser session. Which of the following best describes this attack?
a) IE hijacking
b) Man in the middle
c) Man in the browser
d) Man in the pivot



Answer :

Other Questions