A penetration tester is tasked with demonstrating the impact of an attack on the integrity of data in transit. Which of the following methods would be the BEST to employ to show how an attacker might corrupt the data being sent from a client to a server?
Performing stress tests on the server to overload it and potentially corrupt its stored data.
Conducting an ARP poisoning attack to modify data packets before they reach the server.
Attempting to break SSL/TLS encryption to make the data readable without authorization.
Implementing DNS cache poisoning to redirect the client to a malicious server instead.