Samuel, a professional hacker, monitored and intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN,
Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with a packet having an incremented ISN. Consequently,
Bob's connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob.
What is the type of attack performed by Samuel in the above scenario?
cerzocuspi
Highly Voted 3 years, 7 months agoLoneStarChief
Highly Voted 3 years, 1 month agoBallCS
Most Recent 4 months, 2 weeks agolearn_to_ethic
11 months, 2 weeks agovinothkumars
1 year, 3 months agoPikuuu
1 year, 4 months agovictorfs
1 year, 7 months agoBob_234
1 year, 8 months agojosevirtual
2 years agoDar87
2 years agoDaniel8660
2 years, 1 month agoebuAkif
2 years, 2 months agouday1985
2 years, 2 months agoAisha86
2 years, 3 months agoflinux
2 years, 3 months agocazzobsb
2 years, 8 months agojosek19
2 years, 8 months ago