New Activity
Play Fill in the Blanks Game
1 . ____________________ is the easiest attack to launch since all the packets transit through the attacker . All the ? plain text ? protocols are compromised ( the attacker can ____________________ user and password of many widely used protocol such as telnet , ftp , http )

2 . ____________________ isn't blind ( the attacker knows exactly the sequence numbers of the TCP connection ) .

3 . Within ____________________ , the attacker can modify the sequence numbers and keep the connection synchronized while injecting packets .

4 . Within ____________________ , the attacker can modify the payload of the packets by recalculating the checksum .

5 . Within ____________________ poisoning , the attacker can forge a spoofed ICMP packets to force the host to make an ARP request . Immediately after the ICMP it sends the fake ____________________ replay .

6 . STP ____________________ is not a real MITM attack since the attacker is able to receive only ? unmanaged ? traffic .

7 . Within ICMP redirect , the attacker can forge ICMP redirect packet in order to Redirect ____________________ to himself .

8 . Within IRDP spoofing , The attacker can forge some advertisement packet pretending to be the ____________________ for the LAN . He / she can set the ? preference level ? and the ? lifetime ? at high values to be sure the hosts will choose it as the preferred router .