Question: A malicious attacker has access to a WLAN. This attacker wants to divert all packets addressed to host A to a host B in this
A malicious attacker has access to a WLAN. This attacker wants to divert all packets addressed to host A to a host B in this WLAN that he controls. What kinds of methods can this attacker adopt to achieve this? List at least three methods and illustrate each method.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
