When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, ftp site, or person in a chat session, what type of attack is occurring?
A spoofing attack. "a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."