Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections.
Which of the following attack techniques is used by Stella to compromise the web services?
eli117
Highly Voted 1 year, 6 months agojeremy13
Highly Voted 1 year, 4 months agoinsaniunt
Most Recent 9 months, 2 weeks agoIPconfig
11 months, 1 week ago581777a
1 year, 1 month ago