An attack where an attacker takes over a valid user session by stealing or predicting the session token. This allows the attacker to impersonate the legitimate user and access their account without needing their credentials.
Related Terms
Credential Harvesting
phishingThe process of collecting usernames, passwords, and other authentication credentials through fake login pages, keylogger...
Man-in-the-Middle Attack (MITM)
network-securityAn attack where the attacker secretly intercepts and potentially alters communications between two parties who believe t...
TLS/SSL
network-securityTransport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) are cryptographic protocols that provide s...