Answer:
An attacker can exploit insecure session management by manipulating session tokens, session timeouts, or session identifiers in session hijacking.
An attacker can exploit insecure session management by manipulating session tokens, session timeouts, or session identifiers in session hijacking.
You may be interested in:
Web Security MCQs