wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Session Vulnerabilities

profile
Akanksha Rathod
Aug 17, 2022
1 Like
0 Discussions
104 Reads

Before we learn about the vulnerabilities we should know what is a session.

You might have observed being logged out from a website after you keep it idle for a long time, you also get a message stating that "Session has expired".

Session simply means a group of interactions that a user has on a website within a given time frame. Visiting a website can also be considered as a session, however, in technical words, session can be captured by existing the website or by a period of user inactivity.

How can a session be vulnerable?


1) Generating weak session management:

The logic of creating a session token is pretty simple. The attacker is able to learn the pattern and is able to create a valid fake token using the exposed logic behind the session token creation.

2) Poor handling of sessions:
If the session is not terminated properly, or the token is leaked within the network, token hijacking can take place, where the attacker can easily invade.

3) Using meaningful token as a session ID:
Some developers tries to put a lot of information in the session ID, these information may include username, user id, email address, etc. The value may be encrypted and look long however, if it is decoded, it will give out all the useful information of the user.

4) Using predictable tokens:
The session ID tokens are in encrypted format and hence, we feel that they are safe. However, we do not know if they consist of some pattern or a sequence that is commonly used, if so, attackers can easily guess the token.

Session cookies puts the data into temporary memory and deletes it once the session is finished. This data is then used to track the user's development throughout the website. If these sessions are not managed properly, user's information can be stolen like passwords or confidential data. This attack is called as session hijacking. Attacker can use brute force, can guess or predict the exposed session tokens and impersonates and hijacks a genuine user. 


Comments ()


Sign in

Read Next

It's all about our Brain.- The Brain Metaphor

Blog banner

Flipkart

Blog banner

The Right way of cooking

Blog banner

The seven-step improvement process

Blog banner

Deadlock

Blog banner

LIMITED EDITION

Blog banner

DIGITAL ECONOMY

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Scheduling

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Deadlock and starvation

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Optimization of operating system design

Blog banner

Cloud Computing

Blog banner

Memory management

Blog banner

How I use google in my daily life

Blog banner

INTERRUPTS

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Direct Memory Access

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

What is Internet

Blog banner

Emerging threats in cyber Forensics

Blog banner

How to lose belly fat

Blog banner

security requirements for safe e-payment

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

LISP - Library Management System

Blog banner

Landslide Hazard

Blog banner

My Favorite Sportsperson

Blog banner

Cache memory

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Memory Management

Blog banner

A Deep Dive

Blog banner

What is Data, Information and Knowledge?

Blog banner