Joe, an ECSA certified professional, is working on a pen testing engagement for one of his SME clients. He discovered the host file in one of the Windows machines has the following entry: 213.65.172.55 microsoft.com After performing a Whois lookup, Joe discovered the IP does not refer to Microsoft.com. The network admin denied modifying the host files. Which type of attack does this scenario present?
Joe, an ECSA certified professional, is working on a pen testing engagement for one of his SME clients. He discovered the host file in one of the Windows machines has the following entry:
213.65.172.55 microsoft.com
After performing a Whois lookup, Joe discovered the IP does not refer to Microsoft.com. The network admin denied modifying the host files. Which
type of attack does this scenario present?
DNS starvation
DNS poisoning
Phishing
MAC spoofing
213.65.172.55 microsoft.com
After performing a Whois lookup, Joe discovered the IP does not refer to Microsoft.com. The network admin denied modifying the host files. Which
type of attack does this scenario present?
DNS starvation
DNS poisoning
Phishing
MAC spoofing
Comments
Post a Comment