ECCouncil Exam Questions

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to -www.MyPersonalBank.com-, that the user is directed to a phishing site.

Which fi

le does the attacker need to modify?

A. Hosts

B. Sudoers

C. Boot.ini

D. Networks

The hosts file is a computer file used by an operating system to map hostnames to IP addresses. The hosts file contains lines of text consisting of an IP address

in the first text field followed by one or more host names.

References: