Identify the attack represented in the diagram below:

Identify the attack represented in the diagram below:

Identify the attack represented in the diagram below:

A.
Input Validation

B.
Session Hijacking

C.
SQL Injection

D.
Denial-of-Service

Explanation:

Reference:
http://en.wikipedia.org/wiki/Session_hijacking



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Mark

Mark

Should be Session Fixation