The Process
- First consider there is an vulnerable application hosted at Server A
- The attacker will send his payload to the victim which is hosted at Server B(Attacker's Server)
- The Victim will click on the payload and while his session with the legitimate application is going on which is hosted at Serve A, his cookies will be fetched and passed to the attacker's server i.e. server B.