An attacker is aiming to compromise a network by interceptin…

An attacker is aiming to compromise a network by intercepting data packets and re-transmitting them later to create an unauthorized transaction or event. Additionally, the attacker seeks to manipulate the flow of execution in the systems memory to perform malicious actions without injecting any new code. Which two attack techniques does the attacker use in this scenario?