This is a dedicated watch page for a single video.
Alex, a malicious actor with financial motives, aims to exploit an organization through a MITM attack. Alex executes the attack by intercepting communications and sending his session ID to the target victim. To carry out this exploit, Alex initially acquires a valid session ID by logging into a service. Subsequently, he tricks a targeted employee, John, into using the same session ID. This action establishes a connection between John's session and Alex's account page without revealing any information to John. When John clicks on a link provided by Alex, all the sensitive payment details submitted in a form become linked to Alex's account. What is the specific attack technique employed by Alex in the described scenario?