Answer:
Attackers can exploit insecurely stored session tokens by intercepting and using them to impersonate authenticated users, gaining unauthorized access to user accounts.
Attackers can exploit insecurely stored session tokens by intercepting and using them to impersonate authenticated users, gaining unauthorized access to user accounts.
You may be interested in:
Web Security MCQs