wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Session Vulnerabilities

profile
Akanksha Rathod
Aug 17, 2022
1 Like
0 Discussions
104 Reads

Before we learn about the vulnerabilities we should know what is a session.

You might have observed being logged out from a website after you keep it idle for a long time, you also get a message stating that "Session has expired".

Session simply means a group of interactions that a user has on a website within a given time frame. Visiting a website can also be considered as a session, however, in technical words, session can be captured by existing the website or by a period of user inactivity.

How can a session be vulnerable?


1) Generating weak session management:

The logic of creating a session token is pretty simple. The attacker is able to learn the pattern and is able to create a valid fake token using the exposed logic behind the session token creation.

2) Poor handling of sessions:
If the session is not terminated properly, or the token is leaked within the network, token hijacking can take place, where the attacker can easily invade.

3) Using meaningful token as a session ID:
Some developers tries to put a lot of information in the session ID, these information may include username, user id, email address, etc. The value may be encrypted and look long however, if it is decoded, it will give out all the useful information of the user.

4) Using predictable tokens:
The session ID tokens are in encrypted format and hence, we feel that they are safe. However, we do not know if they consist of some pattern or a sequence that is commonly used, if so, attackers can easily guess the token.

Session cookies puts the data into temporary memory and deletes it once the session is finished. This data is then used to track the user's development throughout the website. If these sessions are not managed properly, user's information can be stolen like passwords or confidential data. This attack is called as session hijacking. Attacker can use brute force, can guess or predict the exposed session tokens and impersonates and hijacks a genuine user. 


Comments ()


Sign in

Read Next

Is Your Password Complex Enough?

Blog banner

The art of being alone

Blog banner

How to make Pancakes

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Social engineering in cyber security

Blog banner

Buffer Overflow

Blog banner

What is Minting & Mining

Blog banner

Policies for Service Transition

Blog banner

Consumer to consumer Business model

Blog banner

RAID

Blog banner

PERT Overview

Blog banner

Man In The Middle Attack

Blog banner

Processing Crime and Incident Scenes

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Number Guessing game --lisp

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Lucidchart

Blog banner

Vikrant’s first blog

Blog banner

Life

Blog banner

Memory Management

Blog banner

Security and E-mail

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Linux

Blog banner

Cyber Security Standards

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Virtual Memory

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Constrains in service design

Blog banner

Stop Racism

Blog banner

Importance of self defence for girls

Blog banner

Interrupts in OS

Blog banner

Fitness

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Modern Operating System

Blog banner

Blockchain Security Technique

Blog banner

Self defence

Blog banner

Smartsheet

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner