wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Session Vulnerabilities

profile
Akanksha Rathod
Aug 17, 2022
1 Like
0 Discussions
104 Reads

Before we learn about the vulnerabilities we should know what is a session.

You might have observed being logged out from a website after you keep it idle for a long time, you also get a message stating that "Session has expired".

Session simply means a group of interactions that a user has on a website within a given time frame. Visiting a website can also be considered as a session, however, in technical words, session can be captured by existing the website or by a period of user inactivity.

How can a session be vulnerable?


1) Generating weak session management:

The logic of creating a session token is pretty simple. The attacker is able to learn the pattern and is able to create a valid fake token using the exposed logic behind the session token creation.

2) Poor handling of sessions:
If the session is not terminated properly, or the token is leaked within the network, token hijacking can take place, where the attacker can easily invade.

3) Using meaningful token as a session ID:
Some developers tries to put a lot of information in the session ID, these information may include username, user id, email address, etc. The value may be encrypted and look long however, if it is decoded, it will give out all the useful information of the user.

4) Using predictable tokens:
The session ID tokens are in encrypted format and hence, we feel that they are safe. However, we do not know if they consist of some pattern or a sequence that is commonly used, if so, attackers can easily guess the token.

Session cookies puts the data into temporary memory and deletes it once the session is finished. This data is then used to track the user's development throughout the website. If these sessions are not managed properly, user's information can be stolen like passwords or confidential data. This attack is called as session hijacking. Attacker can use brute force, can guess or predict the exposed session tokens and impersonates and hijacks a genuine user. 


Comments ()


Sign in

Read Next

Operating Systems

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Why Data Security Is Important

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Women Empowerment

Blog banner

Having passion in life

Blog banner

A True Friendship

Blog banner

Data Visualization in Decision-Making

Blog banner

Types Of Interrupt

Blog banner

Supervised and unsupervised learning

Blog banner

USPS mail

Blog banner

Cache memory

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Indian Culture and Tradition

Blog banner

My favourite food

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

IoT Architecture Based Security

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Email Privacy

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Layers Of Blockchain

Blog banner

Spotify

Blog banner

Memory Management

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Policies for Service Transition

Blog banner

Access management

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Webmail

Blog banner

What is a geographic information system (GIS)?

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

5 Stages of Digital Marketing

Blog banner

File management in os

Blog banner

Blockchain Security Technique

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

10 Reasons to date your best friend

Blog banner

Apache Kafka

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

evolution of operating system - Disha Parekh

Blog banner