A penetration tester would like to obtain FTP credentials by deploying a workstation as an on-path attack between the target and the server that has the FTP protocol. Which of the following methods would be the BEST to accomplish this objective?
- Wait for the next login and perform a downgrade attack on the server.
- Capture traffic using Wireshark.
- Perform a brute-force attack over the server.
- Use an FTP exploit against the server.
Reveal Solution Next Question