Describe the Characteristics of the Following:
•AnonSurf
•Information Gathering
•Password Attack
•Wireless Attack
•SQL Injection Tools
•Phishing Attack
•Web Attack Tool
•Post Exploitation
•Forensic Tool
It's Ok even if you Only Answered One of These
(Computer Science ..ETC..)
Share
Verified answer
Answer:
FORENSIC TOOLS:
PHISHING TOOLS:
Post exploitation
Password attack:
Explanation:
Yan lng knows ko<3^o^