which of the following techniques does an attacker take network traffic coming towards a host at one
admin
In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?