Attacker Steve targeted an organization's network with the aim of redirecting the company's web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities in the DNS server software and modified the original IP address of the target website to that of a fake website.
What is the technique employed by Steve to gather information for identity theft?
[Removed]
Highly Voted 2Â years, 3Â months agodinonino
1Â year, 4Â months agoGummyBear95
Most Recent 10Â months, 2Â weeks agoDaniel8660
1Â year, 3Â months agoKruHacker01
1Â year, 11Â months agoANDRESCB1988
2Â years, 5Â months ago