Which of the following attacks takes best advantage of an existing authenticated connection?

Which of the following attacks takes best advantage of an existing authenticated connection?

Which of the following attacks takes best advantage of an existing authenticated connection?

A.
Spoofing

B.
Session Hijacking

C.
Password Sniffing

D.
Password Guessing

Explanation:
Session hijacking is the act of taking control of a user session after successfully
obtaining or generating an authentication session ID. Session hijacking involves an attacker using
captured,brute forced or reverse-engineered session IDs to seize control of a legitimate user’s
Web application session while that session is still in progress.



Leave a Reply 1

Your email address will not be published. Required fields are marked *