Skip to main content
Solved

Question of the day 30/09, Cybersecurity Edition


marcofabbri
Forum|alt.badge.img+13

LAST DAY

Thanks for this adventure 💚

 

Look at this picture. Each layer as a particular type of attacks.

Fill network layer’s attack.

 

Choose one:

  • Man in the middle
  • Session fixation
  • Bruteforce credentials
  • Enumeration
  • Banner grabbing

 

Best answer by mkevenaar

Man in the middle

View original
Did this topic help you find an answer to your question?

9 comments

mkevenaar
Forum|alt.badge.img+15
  • Veeam Vanguard
  • 149 comments
  • Answer
  • September 30, 2022

Man in the middle


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8517 comments
  • September 30, 2022
  • Man in the middle

JMeixner
Forum|alt.badge.img+17
  • On the path to Greatness
  • 2650 comments
  • September 30, 2022
Show content

Man-in-the-middle

 


Link State
Forum|alt.badge.img+11
  • Veeam Legend
  • 613 comments
  • September 30, 2022
Show content
  • Man in the middle

 


Stabz
Forum|alt.badge.img+8
  • On the path to Greatness
  • 356 comments
  • September 30, 2022
Show content

 

 


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments
  • September 30, 2022
Show content

Man-in-the-middle

 


MicoolPaul
Forum|alt.badge.img+23
  • 2362 comments
  • September 30, 2022
Show content

Man in the Middle

 


marcofabbri
Forum|alt.badge.img+13
  • Author
  • On the path to Greatness
  • 990 comments
  • October 3, 2022

Man in the middle was right! 1 minute video to clarify what’s mitm:

 

Again guys, thanks for this QOTD adventure 😍


mkevenaar
Forum|alt.badge.img+15
  • Veeam Vanguard
  • 149 comments
  • October 3, 2022
marcofabbri wrote:

Again guys, thanks for this QOTD adventure 😍

Thank you for doing this!!!