Session Hijacking A Session Hijacking attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token. Session Prediction Session prediction is an attack technique used to hijack or impersonate a web or application user. The attack focuses on predicting session ID values that permit an attacker to bypass the authentication method of an application. Session Timeout Session timeout occurs when a user does not perform any action on a web site during an interval (defined by a web server). Shellshock Shellshock is a remote command execution vulnerability in BASH. The vulnerability relies on the fact that BASH incorrectly executes trailing commands when it imports a function definition stored into an environment variable. Slow Post A Slow POST attack sends a complete, legitimate HTTP POST header, which includes a Content-Length field to specify the size of the message body to follow. Slow Read A slow read attack is a type of DDoS (distributed denial of service) attack that sends legitimate application layer requests but reads responses very slowly. SOC 2 Compliance: Requirements, Process & Best Practices SOC 2 compliance refers to a framework for managing customer data based on five "trust service criteria". Sockstress Sockstress is an attack tool that exploits vulnerabilities in the TCP stack allowing an attacker to create a denial-of-service condition for a target server. Previous ... 13 14 15 16 17 18 Next 13 14 15
Session Hijacking A Session Hijacking attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token.
Session Prediction Session prediction is an attack technique used to hijack or impersonate a web or application user. The attack focuses on predicting session ID values that permit an attacker to bypass the authentication method of an application.
Session Timeout Session timeout occurs when a user does not perform any action on a web site during an interval (defined by a web server).
Shellshock Shellshock is a remote command execution vulnerability in BASH. The vulnerability relies on the fact that BASH incorrectly executes trailing commands when it imports a function definition stored into an environment variable.
Slow Post A Slow POST attack sends a complete, legitimate HTTP POST header, which includes a Content-Length field to specify the size of the message body to follow.
Slow Read A slow read attack is a type of DDoS (distributed denial of service) attack that sends legitimate application layer requests but reads responses very slowly.
SOC 2 Compliance: Requirements, Process & Best Practices SOC 2 compliance refers to a framework for managing customer data based on five "trust service criteria".
Sockstress Sockstress is an attack tool that exploits vulnerabilities in the TCP stack allowing an attacker to create a denial-of-service condition for a target server.