Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections.
Which of the following attack techniques is used by Stella to compromise the web services?
eli117
Highly Voted 1 year, 9 months agojeremy13
Highly Voted 1 year, 7 months agoinsaniunt
Most Recent 1 year agoIPconfig
1 year, 2 months ago581777a
1 year, 4 months ago