Category:Attack Categorisation By Attacker Model: Web Attacker: Difference between revisions

From Single Sign-On Attacks
Jump to navigation Jump to search
(Created page with "The attacker tries to persuade the victim to open a certain link. The attack is successful if the victim is logged into their account on the targeted Cloud Provider. An exampl...")
 
No edit summary
 
Line 1: Line 1:
The attacker tries to persuade the victim to open a certain link. The attack is successful if the victim is logged into their account on the targeted Cloud Provider. An example of this type of attack is Certificate Injection, which is used for Cross-Site-Request-Forgery (CSRF) also so-called inquiry forgery.
The attacker tries to persuade the victim to open a certain link. The attack is successful if the victim is logged into their account on the targeted Cloud Provider. An example of this type of attack is Certificate Injection, which is used for Cross-Site-Request-Forgery (CSRF) also so-called inquiry forgery.
[[File:MA3_.jpg|centre]]
[[File:MA3_.jpg|centre]]
==Part of main category:==
*[[:Category:Attack_Categorisation_By_Attacker_Model]]
[[Category:Attack_Categorisation_By_Attacker_Model]]

Latest revision as of 22:58, 9 February 2016

The attacker tries to persuade the victim to open a certain link. The attack is successful if the victim is logged into their account on the targeted Cloud Provider. An example of this type of attack is Certificate Injection, which is used for Cross-Site-Request-Forgery (CSRF) also so-called inquiry forgery.

MA3 .jpg

Part of main category:

Pages in category "Attack Categorisation By Attacker Model: Web Attacker"

This category contains only the following page.