An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", that the user is directed to a phishing site. Which file does the attacker need to modify?
The host file is found on the local machine and you can modify this file to have a specific IP Address resolve to a website. This is the file that is commonly used to setup a web server to point an IP to a domain name.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Nabjoe
1 year agoJoker20
1 year, 5 months agoIT_Nerdz
2 years, 1 month ago