0 Members and 1 Guest are viewing this topic.
I guess nothing. Unless it's an persistent one.
You can do whatever you want. Exploit a browser bug, steal credentials, use browsers as zombies.If is persistent, so much easier. If not, also exploitable (more likely targeted attacks).For an example, look for the Beef framework.
Now that is interesting, I guess I'll have to look into that.
Session Hijacking.
http://rapidshare.com/files/129854305/www_GoonWarez_com_1213375552.zip