--

Thanks for the write up dear. Can you please confirm in order to impersonate admin session attacker needs to wait for an actual admin to impersonate the session and then hijack the session ? Or attacker has an ability to perform admin impersonation on temporary basis?

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Muneeb Alam Khan
Muneeb Alam Khan

Written by Muneeb Alam Khan

Testing web & mobile applications.

Responses (2)

Write a response