Which of the following attacks takes best advantage of an existing authenticated connection

Which of the following attacks takes best advantage of an existing authenticated connection

Which of the following attacks takes best advantage of an existing authenticated connection

A.
Spoofing

B.
Session Hijacking

C.
Password Sniffing

D.
Password Guessing

Explanation:
Session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user’s Web application session while that session is still in progress.



Leave a Reply 0

Your email address will not be published. Required fields are marked *