Which of the following techniques is used by Joel in the above scenario?

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim’s machine. Joel waits for the victim to access the infected web application so as to compromise the victim’s machine .

Which of the following techniques is used by Joel in the above scenario?
A . DNS rebinding attack
B . Clickjacking attack
C . MarioNet attack
D . Watering hole attack

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments