Fill This Form To Receive Instant Help
Homework answers / question archive / The attacker uses the following attack, in order to listen to the conversation between the user and the server and captures the authentication token of the user
The attacker uses the following attack, in order to listen to the conversation between the user and the server and captures the authentication token of the user. With this authentication token, the attacker replays the request to the server with the captured authentication token and gains unauthorized access to the server
Session Replay attack
Session Fixation attacks
Session hijacking using proxy servers
Client side attacks