Identify the attack from following sequence of actions?

Identify the attack from following sequence of actions? Step 1: A user logs in to a trusted site and
creates a new session. Step 2: The trusted site stores a session identifier for the session in a
cookie in the web browser. Step 3: The user is tricked to visit a malicious site. Step 4: the
malicious site sends a request from the user’s browser using his session cookie.

Identify the attack from following sequence of actions? Step 1: A user logs in to a trusted site and
creates a new session. Step 2: The trusted site stores a session identifier for the session in a
cookie in the web browser. Step 3: The user is tricked to visit a malicious site. Step 4: the
malicious site sends a request from the user’s browser using his session cookie.

A.
Cross-Site Request Forgery (CSRF) Attack

B.
Hidden Field Manipulation Attack

C.
Cross-Site Scripting (XSS) Attacks

D.
Web Application Denial-of-Service (DoS) Attack



Leave a Reply 0

Your email address will not be published. Required fields are marked *