Question: Suppose hacker H is planning an attack into deceiving victim V navigate website unintended by V. In this scenario, every time V requests the websitewww.vStore.com,

Suppose hacker H is planning an attack into deceiving victim V navigate website unintended by V. In this scenario, every time V requests the websitewww.vStore.com, the hacker's objective is that V actually is redirected towww.hStore.com.

a. What type of attack do you think hacker H would use for this scenario? And What resources would the hacker need for the type of attack method you proposed and explain why? [3.5 Marks]

b. Describe how the attack you proposed in question a happens. List all steps involved and use the necessary diagram to elaborate your answer. [4 marks]

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!