What type of trust exploitation attack uses a compromised host to pass traffic through a firewall that would otherwise be blocked.

What type of trust exploitation attack uses a compromised host to pass traffic through a firewall that would otherwise be blocked.



Answer: Port Redirection


Learn More :