|Authors:||James F. Kurose, Keith W. Ross|
|Chapter:||Computer Networks And The Internet|
Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position.
Consider the given data:
The following steps to list some of the malicious things Trudy can do from this position: