wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Session Vulnerabilities

profile
Akanksha Rathod
Aug 17, 2022
1 Like
0 Discussions
104 Reads

Before we learn about the vulnerabilities we should know what is a session.

You might have observed being logged out from a website after you keep it idle for a long time, you also get a message stating that "Session has expired".

Session simply means a group of interactions that a user has on a website within a given time frame. Visiting a website can also be considered as a session, however, in technical words, session can be captured by existing the website or by a period of user inactivity.

How can a session be vulnerable?


1) Generating weak session management:

The logic of creating a session token is pretty simple. The attacker is able to learn the pattern and is able to create a valid fake token using the exposed logic behind the session token creation.

2) Poor handling of sessions:
If the session is not terminated properly, or the token is leaked within the network, token hijacking can take place, where the attacker can easily invade.

3) Using meaningful token as a session ID:
Some developers tries to put a lot of information in the session ID, these information may include username, user id, email address, etc. The value may be encrypted and look long however, if it is decoded, it will give out all the useful information of the user.

4) Using predictable tokens:
The session ID tokens are in encrypted format and hence, we feel that they are safe. However, we do not know if they consist of some pattern or a sequence that is commonly used, if so, attackers can easily guess the token.

Session cookies puts the data into temporary memory and deletes it once the session is finished. This data is then used to track the user's development throughout the website. If these sessions are not managed properly, user's information can be stolen like passwords or confidential data. This attack is called as session hijacking. Attacker can use brute force, can guess or predict the exposed session tokens and impersonates and hijacks a genuine user. 


Comments ()


Sign in

Read Next

Design Considerations for Disk Cache Management

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

File management In Operating System

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Starvation and Deadlock.

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

From Model Mistakes to Metrics

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Deadlock in operating system

Blog banner

Memory Management in an Operating System

Blog banner

A buffer overflow

Blog banner

Deadlock and Starvation

Blog banner

Facebook marketing

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Deadlocks in Operating System

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Virtual memory

Blog banner

MYNTRA

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

Understanding Business Layer in Data Science

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Linker

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

The Golden Temple , Amritsar

Blog banner

Pooja Silver

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Question

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Theads

Blog banner

Emerging threats in cyber Forensics

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Risk factors in service transistion

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Process Creation

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner