An attacker is bypassing client-side input validation by intercepting and modifying data within the HTTP POST command. Which of the following does the attacker use in this attack?
A. Command injection
B. Flash cookie
C. Proxy
D. Exception handling
Answer: C. Proxy