Web13: Session Hijacking Hacking Techniques
In this article, TipsMake.com invites you to learn the Session Hijacking hacking technique.
1. Cause
After each successful user login, the session will be redefined and have a new session ID. If the attacker knows this new Session ID, then the attacker can access the application as a normal user. There are many ways for the attacker to get the session ID and take over the user's session such as: Man-in-the-middle attack: eavesdropping and stealing the user's session ID. Or take advantage of XSS errors in programming to get the user's Session ID.
2. Mining ways
Session Sniffing
As we can see in the figure, first, the attacker will use a sniffer tool to capture the valid session ID of the victim, then he uses this session ID to work with the Web Server under the victim's authority.
Cross-site script attack
An attacker can obtain the victim's session ID by means of malicious code that runs on the client side, such as JavaScript. If a website has an XSS vulnerability, an attacker can create a link containing malicious JavaScript code, and send it to the victim. If the victim clicks on this link, his cookie will be sent to the attacker.
3. Prevention
The following methods can be used to prevent Session Hijacking:
- Use HTTPS in data transmission to avoid eavesdropping.
- Use a large random string or number to limit the success of a bruteforce attack.
- Regenerate session ID after each user successfully login, to avoid Session Fixation attack.
Wish you get more knowledge after each lesson with TipsMake.com!
You should read it
- Learn about attacking Man in the Middle - Taking over Session control
- Learn about Man-in-the-Middle attacks - ARP Cache spoofing
- Session in PHP
- Analyze DLL hijacking attacks
- What is Domain Hijacking? How dangerous is it?
- Function SESSION_USER in SQL Server
- Learn about DNS Hijacking and how to prevent it!
- The reset session command in Windows
- How to Create a Secure Session Management System in PHP and MySQL
- Group Session: A new feature on Spotify that allows users to listen to music together
- Learn about Man-in-the-Middle attacks - Obtain SSL control
- What is Browser Hijacking?
Maybe you are interested
Nuclear power plant start-up process How to share a website via QR code on Microsoft Edge FAST, the world's largest telescope, begins to look for life in the universe Description of the P2P-Worm.Win32.BlackControl.g template 10 signs of mobile phone addiction Signs to know to replace new refrigerators