Answer:
Attackers can exploit session hijacking by intercepting or stealing session identifiers to impersonate legitimate users and gain unauthorized access.
Attackers can exploit session hijacking by intercepting or stealing session identifiers to impersonate legitimate users and gain unauthorized access.
You may be interested in:
Web Security MCQs - PART 2