Describe how an attacker could use a sniffer in conjunction with a Trojan to successfully gain access to sensitive data. The initial post should be a minimum of 250 words. Use of significant detail (utilizing textbook, web, etc. for sources) and appropriate grammar. Also, remember to include (if applicable) supporting references in APA format and citations from those references within the body of your discussions, properly formatted using APA style. .