Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser
Step 3: The user is tricked to visit a malicious site
Step 4: the malicious site sends a request from the user’s browser using his session cookie
A.
Web Application Denial-of-Service (DoS) Attack
B.
Cross-Site Scripting (XSS) Attacks
C.
Cross-Site Request Forgery (CSRF) Attack
D.
Hidden Field Manipulation Attack