A security analyst is investigating a potential network-level session hijacking incident. During the investigation, the analyst finds that the attacker has been using a technique in which they injected an authentic-looking reset packet using a spoofed source IP address and a guessed acknowledgment number. As a result, the victim's connection was reset. Which of the following hijacking techniques has the attacker most likely used?
e30b32d
1Â month, 1Â week agoKnightHeart
1Â month, 1Â week agoKnightHeart
1Â month, 1Â week ago[Removed]
2Â months, 2Â weeks agokillwitch
3Â months, 2Â weeks ago