Replay Attack
Replay attack → attack where valid captured data such as authentication messages or session tokens are recorded and resent later to gain unauthorized access, often performed using network taps, address resolution protocol poisoning, or malware on the victim’s system.
Pass the Hash
Pass the hash → attack technique where an attacker uses a stolen password hash to authenticate without knowing the actual plaintext password, commonly seen in Windows authentication environments.
Browser Cookie & Session IDs
Browser cookies and session identifiers → small data values stored by browsers that maintain authenticated sessions, which become high-value targets because stealing them can allow session hijacking.
Session Hijacking
Session hijacking → also called sidejacking, attack where an attacker takes over an active user session by stealing session identifiers or cookies, allowing impersonation without reauthentication.
Header Manipulation
Header manipulation → attack where an attacker alters Hypertext Transfer Protocol headers to bypass security controls, inject malicious data, or impersonate legitimate users.
Malicious Code
Malicious code → any unauthorized code intentionally designed to cause harm, including malware, scripts, or injected instructions that compromise confidentiality, integrity, or availability.
Privilege Escalation Attack
Privilege escalation attack → attack where an attacker gains higher-level permissions than originally authorized, often by exploiting software vulnerabilities or misconfigurations.
Cross-site Request Attack
Cross-site request attack → attack that tricks a user’s browser into sending unintended requests to a trusted website while the user is authenticated, abusing session trust.
XSRF
Cross-site request forgery (XSRF) → attack where malicious requests are sent from a user’s authenticated browser without their knowledge, often mitigated using tokens, proper authentication checks, and request validation.