First page
Back
Continue
Last page
Summary
Graphic
Session Stealing
Takes advantage of inappropriate trust
Permits an attacker to capture and take over a network session
Works Through Firewalls