Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections.
Which of the following attack techniques is used by Stella to compromise the web services?
eli117
Highly Voted 1 year, 7 months agojeremy13
Highly Voted 1 year, 6 months agoinsaniunt
Most Recent 11 months, 1 week agoIPconfig
1 year ago581777a
1 year, 3 months ago