Question: A hacker from Croatia inserted a malicious string of code in a popular news websites database. When a researcher from a financial institution requested a
A hacker from Croatia inserted a malicious string of code in a popular news website’s database. When a researcher from a financial institution requested a page from the website, it was sent along with the malicious string. The researcher’s browser executed the string inside the response and sent the researcher’s cookies to the hacker. The hacker used the cookies to impersonate the researcher. What computer fraud approach did the hacker use to obtain the cookies?
a. Man-in-the middle attack
b. Hijacking attack
c. Buffer overflow attack
d. Cross-site scripting attack
e. Impersonation
Step by Step Solution
3.39 Rating (165 Votes )
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
