164k views
2 votes
A junior administraotor comes to you in a panic. After looking at the log files, he has become conviced that an attacker is attempting to use a duplicate IP address to replace another system in the network to gain access. Which type of attack is this?

User Felina
by
5.6k points

1 Answer

3 votes

Answer:

TCP/IP hijacking

Step-by-step explanation:

TCP/IP hijacking occurs when an authorized person receives access to the network connection of another person. This is considered a form of a man-in-the-middle attack.

The attacker can identify the IP addresses of two session users, a Denial-of-service (DoS) attack is used to incapacitate one of them while a connection is made by mirroring the network ID of the incapacitated user.

When an IP address is duplicated to replace another system in the network to gain access, TCP/IP hijacking has taken place.

User Shady Mostafa
by
6.7k points