answersLogoWhite

0


Best Answer

MITM Man-In-The-Middle attack

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which type of attack is it when a malicious host controls a TCP session between two users?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

During or after an attack who controls you movement between sectors and zones?

your unit comtrol center


During or after an attack who controls your movement between sectors and zones?

Your Unit Control Center


During of after an attack who controls your movement between sectors and zones?

your unit control center


During or after an attack who controls your movememnt between sectors and zones?

your unit control center


During or after an attack who controls movements between sectors?

Your Unit Control Center (UCC)


What class of attack is focused on the malicious modification of hardware or software at the factory?

Distributed


A malicious user can rely on email or webpage to launch a?

Spyware


Why is network needed?

To make sure Viruses and Malicious software can't attack your computer.


What type of attack is usually a precursor to TCP session hijacking?

Sniffing


How can web tools such as java or ActiveX be used for malicious attack?

by installing unwanted programs on a computer


Why is network security needed?

To make sure Viruses and Malicious software can't attack your computer.


How can web tools such as Java or ActiveX be used for a malicious attack?

by installing unwanted programs on a computer