wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Session Vulnerabilities

profile
Akanksha Rathod
Aug 17, 2022
1 Like
0 Discussions
104 Reads

Before we learn about the vulnerabilities we should know what is a session.

You might have observed being logged out from a website after you keep it idle for a long time, you also get a message stating that "Session has expired".

Session simply means a group of interactions that a user has on a website within a given time frame. Visiting a website can also be considered as a session, however, in technical words, session can be captured by existing the website or by a period of user inactivity.

How can a session be vulnerable?


1) Generating weak session management:

The logic of creating a session token is pretty simple. The attacker is able to learn the pattern and is able to create a valid fake token using the exposed logic behind the session token creation.

2) Poor handling of sessions:
If the session is not terminated properly, or the token is leaked within the network, token hijacking can take place, where the attacker can easily invade.

3) Using meaningful token as a session ID:
Some developers tries to put a lot of information in the session ID, these information may include username, user id, email address, etc. The value may be encrypted and look long however, if it is decoded, it will give out all the useful information of the user.

4) Using predictable tokens:
The session ID tokens are in encrypted format and hence, we feel that they are safe. However, we do not know if they consist of some pattern or a sequence that is commonly used, if so, attackers can easily guess the token.

Session cookies puts the data into temporary memory and deletes it once the session is finished. This data is then used to track the user's development throughout the website. If these sessions are not managed properly, user's information can be stolen like passwords or confidential data. This attack is called as session hijacking. Attacker can use brute force, can guess or predict the exposed session tokens and impersonates and hijacks a genuine user. 


Comments ()


Sign in

Read Next

Deadlocks

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Microsoft Windows Overview

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Key to success in Sports

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Article on IT development trends

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Bit Coins

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

VPN

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

DATA WRANGLING

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Brain wash of social media

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

INTERNET SECURITY

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

I Personally

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Traveling

Blog banner

LIFEHACKER

Blog banner

Data Mapping

Blog banner

Mumbaicha Dabbawalla

Blog banner

Processes: Process Description and Control.

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

USES OF WHATSAPP

Blog banner

Functions Of Operating Systems

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Virtual memory

Blog banner

E-Cash (Electronic Cash)

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Computer Security

Blog banner

Blockchain in IoT Applications

Blog banner

security controls

Blog banner