Which of the following techniques can be bypass a user or computer’s web browser privacy settings? (Select Two)
A. SQL injection
B. Session hijacking
C. Cross-site scripting
D. Locally shared objects
E. LDAP injection
Which of the following techniques can be bypass a user or computer’s web browser privacy settings? (Select Two)
A. SQL injection
B. Session hijacking
C. Cross-site scripting
D. Locally shared objects
E. LDAP injection
B. Session hijacking, also known as cookie side-jacking, is another form of man-in-the-middle attack that will give a hacker full access to an online account.
C. Cross-site scripting works by manipulating a vulnerable web site so that it returns malicious JavaScript to users. When the malicious code executes inside a victim’s browser, the attacker can fully compromise their interaction with the application.
Not A – SQL injection is a type of attack that can give an adversary complete control over your web application database – not control over your session.