✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
An attacker connects to a corporate network with the following goal: to intercept user credentials and gain administrator access to internal services. To achieve this, the attacker does the following:
Sends a large number of DHCP requests using spoofed MAC addresses until the DHCP pool is exhausted.
Sets up a rogue DHCP server that issues IP addresses along with a fake DNS server address pointing to a malicious website.
Spoofs ARP responses to redirect all local traffic through their machine.
Records a legitimate admin login session and later replays it to gain unauthorized access to internal applications.
Finally, uses elevated shell access gained through a misconfigured internal service to grant themselves permanent admin rights.
Which of the following attacks were performed by the attacker?