Which of the following attacks takes best advantage of an existing authenticated connection?

Posted by: Pdfprep Category: CEH-001 Tags: , ,

Which of the following attacks takes best advantage of an existing authenticated connection?
A . Spoofing
B . Session Hijacking
C . Password Sniffing
D . Password Guessing

Answer: B

Explanation:

Session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user’s Web application session while that session is still in progress.

Leave a Reply

Your email address will not be published.