Answer:
In this technique the attacker compromises the DNS ( Domain Name System) servers or on the user computer so that traffic is directed to a malicious site.
Previous Question | Next Question |
List the types of Cross site scripting? | What is Defacement? |