Session Hijacking
SKILLSET
To maliciously take control of a data exchange.
Related Questions
- A tiny unobtrusive object (such as a transparent GIF image) that resides inside a web page and is used to monitor web activity would be called:
- Which one of these tools can be used to hijack TCP sessions:
- Jones was able to capture temporary credentials passing over the wireless network in a coffee shop. This is the _____ attack.
- In normal data communications, if you send 45 bytes of data, the ACK responds using:
- What is a common method of session hijacking where the attacker uses source-routed IP packets to insert commands into a communication while disguised as an authenticated user?
- In PHP, the 2 methods of passing the session ID to the server are:
- Using cookies is a more secure design than integrated browser authentication. True or false?
- Who among the following are vulnerable to session hijacking attacks?
- Which of the statements regarding session hijacking is incorrect:
- Source routing allows a network application to specify the route it would like to take to its destination?