List of questions
Related questions
Question 43 - 312-38 discussion
Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?
A.
Replay
B.
Fire walking
C.
Cross site scripting
D.
Session fixation
Your answer:
0 comments
Sorted by
Leave a comment first