ceh questions An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to “www.MyPersonalBank.com”, that the user is directed to a phishing site. Which file does the attacker need to modify? 1 min read 2 years ago admin Networks Hosts Sudoers Boot.ini admin See author's posts Continue Reading Previous In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims. What is the difference between pharming and phishing attacks?Next Which of the following security policies defines the use of VPN for gaining access to an internal corporate network?