Certified Ethical Hacker v11 312-50v11 – Question194

Samuel, a professional hacker, monitored and intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with a packet having an incremented ISN. Consequently,
Bob's connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob.
What is the type of attack performed by Samuel in the above scenario?

A.
TCP/IP hijacking
B. Blind hijacking
C. UDP hijacking
D. Forbidden attack

Correct Answer: A