Question: An attacker is aiming to compromise a network by intercepting data packets and re - transmitting them later to create an unauthorized transaction or event.
An attacker is aiming to compromise a network by intercepting data packets and retransmitting them later to create an
unauthorized transaction or event. Additionally, the attacker seeks to manipulate the flow of execution in the system's
memory to perform malicious actions without injecting any new code. Which two attack techniques does the attacker use in
this scenario?
Replay attack and returnoriented programming.
Covert channel and SQL injection.
Replay attack and buffer overflow.
Race conditions and botnet exploitation.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
