Certified Ethical Hacker (CEHv9) Questions and answers
27. Which of the following is assured by the use of a hash
28. An attacker changes the profile information of a particular user (victim) on the target website.
The attacker uses this string to update the victim's profile to a text file and then submit the data to the attacker's database.
< /iframe> What is this type of attack
(that can use either HTFP GET or HTTP POST) called?