Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser
Step 3: The user is tricked to visit a malicious site
Step 4: the malicious site sends a request from the user’s browser using his session cookie
A . Web Application Denial-of-Service (DoS) Attack
B . Cross-Site Scripting (XSS) Attacks
C . Cross-Site Request Forgery (CSRF) Attack
D . Hidden Field Manipulation Attack
Answer: C