Which of the following attacks takes best advantage of an existing authenticated connection?
A.
Spoofing
B.
Session Hijacking
C.
Password Sniffing
D.
Password Guessing
Explanation:
Session hijacking is the act of taking control of a user session after successfully
obtaining or generating an authentication session ID. Session hijacking involves an attacker using
captured,brute forced or reverse-engineered session IDs to seize control of a legitimate user’s
Web application session while that session is still in progress.
B