wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Session Vulnerabilities

profile
Akanksha Rathod
Aug 17, 2022
1 Like
0 Discussions
104 Reads

Before we learn about the vulnerabilities we should know what is a session.

You might have observed being logged out from a website after you keep it idle for a long time, you also get a message stating that "Session has expired".

Session simply means a group of interactions that a user has on a website within a given time frame. Visiting a website can also be considered as a session, however, in technical words, session can be captured by existing the website or by a period of user inactivity.

How can a session be vulnerable?


1) Generating weak session management:

The logic of creating a session token is pretty simple. The attacker is able to learn the pattern and is able to create a valid fake token using the exposed logic behind the session token creation.

2) Poor handling of sessions:
If the session is not terminated properly, or the token is leaked within the network, token hijacking can take place, where the attacker can easily invade.

3) Using meaningful token as a session ID:
Some developers tries to put a lot of information in the session ID, these information may include username, user id, email address, etc. The value may be encrypted and look long however, if it is decoded, it will give out all the useful information of the user.

4) Using predictable tokens:
The session ID tokens are in encrypted format and hence, we feel that they are safe. However, we do not know if they consist of some pattern or a sequence that is commonly used, if so, attackers can easily guess the token.

Session cookies puts the data into temporary memory and deletes it once the session is finished. This data is then used to track the user's development throughout the website. If these sessions are not managed properly, user's information can be stolen like passwords or confidential data. This attack is called as session hijacking. Attacker can use brute force, can guess or predict the exposed session tokens and impersonates and hijacks a genuine user. 


Comments ()


Sign in

Read Next

Goa Trip With Friends

Blog banner

rupee

Blog banner

Why Friendship at Work is Important

Blog banner

Getting into anime My anime suggestions

Blog banner

What is semaphore in operating system?

Blog banner

Virtual Machine

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

10 Rare Historic Pictures that are Ever Captured

Blog banner

Importance Of Education.

Blog banner

Two major obstacle to India’s economic growth: Twin Balance Sheet and Lower Private Investments

Blog banner

Memory Management

Blog banner

Is Your Password Complex Enough?

Blog banner

Data Visualization

Blog banner

Virtual memory

Blog banner

Virtual Machine

Blog banner

How to manage in BEST bus in mumbai specially PEAK Time!

Blog banner

Virtual Machine

Blog banner

URL vs Domain

Blog banner

Riddhi Miyani 53003220140

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Multiple processor scheduling

Blog banner

CoWIN

Blog banner

Mumbai

Blog banner

AOL Mail

Blog banner

Child labour

Blog banner

Message Passing in OS

Blog banner

CONCURRENCY

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Evolution of Operating Systems

Blog banner

Self Confidence

Blog banner

HTML vs HTML5

Blog banner

Direct memory access

Blog banner

IT security management

Blog banner

A True Friendship

Blog banner

Reconnaissance

Blog banner

Understanding Regression Analysis

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

The Evolution of Operating Systems

Blog banner

Starting Android Activity Using Intent

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner