An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?
A Oman in the middle
B buffer overflow
C trust exploitation
D port redirection