In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access.
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Token Injection Replay attacks
B.
Shoulder surfing attack
C.
Rainbow and Hash generation attack
D.
Dumpster diving attack