Web application security - the fast guide 1.1 | Page 100
Chapter 5 - Attack Execution the client
P a g e | 100
3- If the MAC is enabled, you can see (MAC enabled) message in the tree
root.
4- The encrypted value will be shown if MAC is not enabled
5.13 Time of Creation to Time of Use
Create
legitimate
session
Invalidate
credentials
without
invalidating
the session
Session
Time
Figure 39: Time to create to time to use
Use the
application
with
privileged
role