Hash injection attack allows attackers to inject a compromised hash into a local session and use the hash to validate network resources.