diff --git a/pages/attacks/Session_fixation.md b/pages/attacks/Session_fixation.md index a514bbc2b3..6e99f50fb9 100644 --- a/pages/attacks/Session_fixation.md +++ b/pages/attacks/Session_fixation.md @@ -59,13 +59,13 @@ inside of the cookie that it will use to keep a session between the client and the Web Application. o - +``` tag - +``` tag also is considered a code injection attack, however, different from the XSS attack where undesirable scripts can be disabled, or the execution can be denied. The attack using this method becomes much more @@ -118,11 +118,11 @@ executed in the victim's browser. ` http://website.kom/` ### Example 3 - +``` tag - +``` As well as client-side scripting, the code injection must be made in the URL that will be sent to the victim. @@ -175,4 +175,4 @@ Figure 2. Set-Cookie in the HTTP header response [Category:OWASP ASDR Project](Category:OWASP_ASDR_Project "wikilink") [Category:Exploitation of Authentication](Category:Exploitation_of_Authentication "wikilink") -[Category:Attack](Category:Attack "wikilink") \ No newline at end of file +[Category:Attack](Category:Attack "wikilink")