wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Session Vulnerabilities

profile
Akanksha Rathod
Aug 17, 2022
1 Like
0 Discussions
104 Reads

Before we learn about the vulnerabilities we should know what is a session.

You might have observed being logged out from a website after you keep it idle for a long time, you also get a message stating that "Session has expired".

Session simply means a group of interactions that a user has on a website within a given time frame. Visiting a website can also be considered as a session, however, in technical words, session can be captured by existing the website or by a period of user inactivity.

How can a session be vulnerable?


1) Generating weak session management:

The logic of creating a session token is pretty simple. The attacker is able to learn the pattern and is able to create a valid fake token using the exposed logic behind the session token creation.

2) Poor handling of sessions:
If the session is not terminated properly, or the token is leaked within the network, token hijacking can take place, where the attacker can easily invade.

3) Using meaningful token as a session ID:
Some developers tries to put a lot of information in the session ID, these information may include username, user id, email address, etc. The value may be encrypted and look long however, if it is decoded, it will give out all the useful information of the user.

4) Using predictable tokens:
The session ID tokens are in encrypted format and hence, we feel that they are safe. However, we do not know if they consist of some pattern or a sequence that is commonly used, if so, attackers can easily guess the token.

Session cookies puts the data into temporary memory and deletes it once the session is finished. This data is then used to track the user's development throughout the website. If these sessions are not managed properly, user's information can be stolen like passwords or confidential data. This attack is called as session hijacking. Attacker can use brute force, can guess or predict the exposed session tokens and impersonates and hijacks a genuine user. 


Comments ()


Sign in

Read Next

Skills An Ethical Hacker Must Have

Blog banner

Difference Between Classification And Clustering

Blog banner

Deadlock in operating system

Blog banner

HR Automation : Need of the hour

Blog banner

Virtual Memory

Blog banner

Security and E-mail

Blog banner

Operating system

Blog banner

PROCESS STATE:

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Dangers of Using Public WiFis

Blog banner

Random Forests

Blog banner

Memory Management

Blog banner

My Favorite Sportsperson

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Platonic Solids

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Service Strategy In ITSM

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

How to grow followers on Instagram business account?

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

City of Mumbai (Bombay):

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

A Journey By Train

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Types of Threads

Blog banner

PERSONAL STORIES

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Scheduling in Operating Systems

Blog banner

The Laws of Karma

Blog banner

SQL Injection

Blog banner

Sagar Parikrama

Blog banner

Types Of scheduling

Blog banner

Game via listing method

Blog banner

Simple Ways to Grow Your Brand Online

Blog banner

Memory Management

Blog banner

This too shall pass

Blog banner

Goa Trip With Friends

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Blog on health and fitness

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

IO Buffers

Blog banner