Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser
Step 3: The user is tricked to visit a malicious site
Step 4: the malicious site sends a request from the user's browser using his session cookie
Adria
6 months agoRoslyn
7 months agoViki
7 months agoElvis
7 months agoFanny
7 months agoDavida
7 months agoGlenna
7 months agoShanda
7 months agoNikita
7 months agoLinn
7 months agoGwenn
7 months agoElvera
7 months agoRebeca
7 months agoCarla
8 months ago