SANS Hacker Tools, Techniques, Exploits and Incident Handling SEC504 Question # 52 Topic 6 Discussion

SANS Hacker Tools, Techniques, Exploits and Incident Handling SEC504 Question # 52 Topic 6 Discussion

SEC504 Exam Topic 6 Question 52 Discussion:
Question #: 52
Topic #: 6

Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?


A.

Replay


B.

Firewalking


C.

Session fixation


D.

Cross site scripting


Get Premium SEC504 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.