Answer:
Attackers can exploit weak session management by manipulating session handling processes to gain unauthorized access to objects or data in IDOR attacks.
Attackers can exploit weak session management by manipulating session handling processes to gain unauthorized access to objects or data in IDOR attacks.
You may be interested in:
Web Security MCQs - PART 2