Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser
Step 3: The user is tricked to visit a malicious site
Step 4: the malicious site sends a request from the user's browser using his session cookie
Adria
4 months agoRoslyn
4 months agoViki
4 months agoElvis
4 months agoFanny
5 months agoDavida
5 months agoGlenna
5 months agoShanda
5 months agoNikita
5 months agoLinn
5 months agoGwenn
5 months agoElvera
5 months agoRebeca
5 months agoCarla
5 months ago