1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Session attacks
session hijacking attacks take a different approach by stealing an existing authenticated session
Cookie manipulation
Once the attacker has the cookie, they may perform ____ to alter the details sent back to the website or simply use the cookie as the badge required to gain access to the site. This is known as a session replay attack
NTLM pass-the-hash attack
The ____ is another form of replay attack that takes place against the operating system rather than a web application. The attacker begins by gaining access to a Windows system and then harvests stored NTLM password hashes from that system. They can then attempt to use these hashes to gain user or administrator access to that system or other systems in the same Active Directory domain
Insecure Direct Object References
If the application does not perform authorization checks, the user may be permitted to view information that exceeds their authority. This situation is known as ___