ECCouncil Exam Questions

Identify the attack represented in the diagram below:

Identify the attack represented in the diagram below:

A.
Input Validation

B.
Session Hijacking

C.
SQL Injection

D.
Denial-of-Service

Explanation:

Reference:
http://en.wikipedia.org/wiki/Session_hijacking