Web application security - the fast guide 1.1 | Page 100

Chapter 5 - Attack Execution the client P a g e | 100 3- If the MAC is enabled, you can see (MAC enabled) message in the tree root. 4- The encrypted value will be shown if MAC is not enabled 5.13 Time of Creation to Time of Use Create legitimate session Invalidate credentials without invalidating the session Session Time Figure 39: Time to create to time to use Use the application with privileged role