Which attack lures the victim to click a bogus link that redirects to the attacker's server?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which attack lures the victim to click a bogus link that redirects to the attacker's server?

Explanation:
Redirecting a victim’s traffic through an attacker-controlled proxy is a session hijacking technique that relies on the attacker’ s ability to intercept and capture the user’s session data. When the user is lured to click a bogus link and is then redirected to a proxy under the attacker’s control, the proxy sits between the user and the target site. The proxy can see and potentially modify HTTP requests and responses, including session cookies or tokens. With those credentials, the attacker can impersonate the user on the target site, effectively taking over the session. This approach specifically uses a proxy to hijack the session, which is why it fits this scenario. Other options don’t revolve around redirecting the victim to a malicious proxy: CRIME is a TLS compression side-channel attack unrelated to user redirection; DroidSheep focuses on grabbing cookies over insecure wireless networks rather than redirecting traffic to a proxy; RST hijacking involves manipulating TCP connections, not luring users with a malicious link to a proxy.

Redirecting a victim’s traffic through an attacker-controlled proxy is a session hijacking technique that relies on the attacker’ s ability to intercept and capture the user’s session data. When the user is lured to click a bogus link and is then redirected to a proxy under the attacker’s control, the proxy sits between the user and the target site. The proxy can see and potentially modify HTTP requests and responses, including session cookies or tokens. With those credentials, the attacker can impersonate the user on the target site, effectively taking over the session.

This approach specifically uses a proxy to hijack the session, which is why it fits this scenario. Other options don’t revolve around redirecting the victim to a malicious proxy: CRIME is a TLS compression side-channel attack unrelated to user redirection; DroidSheep focuses on grabbing cookies over insecure wireless networks rather than redirecting traffic to a proxy; RST hijacking involves manipulating TCP connections, not luring users with a malicious link to a proxy.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy