✅ Перевірена відповідь на це питання доступна нижче. Наші рішення, перевірені спільнотою, допомагають краще зрозуміти матеріал.
An attacker connects to a corporate network with the following goal: to intercept user credentials and gain administrator access to internal services. To achieve this, the attacker does the following:
Sends a large number of DHCP requests using spoofed MAC addresses until the DHCP pool is exhausted.
Sets up a rogue DHCP server that issues IP addresses along with a fake DNS server address pointing to a malicious website.
Spoofs ARP responses to redirect all local traffic through their machine.
Records a legitimate admin login session and later replays it to gain unauthorized access to internal applications.
Finally, uses elevated shell access gained through a misconfigured internal service to grant themselves permanent admin rights.
Which of the following attacks were performed by the attacker?