GAQM Related Exams
CPEH-001 Exam

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to " ", that the user is directed to a phishing site.
Which file does the attacker need to modify?
Which of the following is not a Bluetooth attack?