Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session. Upon receiving the user's request, Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website.
What is the attack performed by Bobby in the above scenario?
cerzocuspi
Highly Voted 2Â years, 2Â months agoScryptic
Highly Voted 1Â year, 10Â months agoDaniel8660
Most Recent 8Â months, 3Â weeks agostrale
1Â year agoANDRESCB1988
1Â year, 11Â months agotrfab
1Â year, 11Â months ago