Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
104 views
Module 11 Session Hijacking
Uploaded by
Nghia Tran Van
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module 11 Session Hijacking For Later
Download
Save
Save Module 11 Session Hijacking For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
104 views
Module 11 Session Hijacking
Uploaded by
Nghia Tran Van
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module 11 Session Hijacking For Later
Carousel Previous
Carousel Next
Download
Save
Save Module 11 Session Hijacking For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 86
Search
Fullscreen
CEH Certified || Ethical Hacker Module 11: Session HijackingEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Session Hijacking Module Objectives a Understanding Session Hijacking Concepts . Understanding Application Level Session Hacking a 2p Undestnding Netware! Sesion ecg Overview of Session Hijacking Tools Understanding offerent Session Hijacking Countermeasures Module Objectives hijacking allows attackers to take over an active session by bypassing the authent cked system. Ses process. Thereafter, they can perform any action on the This module aims to provide comprehensive information on session hijacking. It starts with an introduction to session hijacking concepts and provides insight into session hijacking at the application and network levels. Later, the module discusses tools used to hijack a session between a client and server. It also discusses various countermeasures to defend against session hijacking attacks. At the end of this module, you will be able to do the following: * Describe session hijacking concepts Perform application level session hijacking "Perform network level session hijacking Use different session hijacking tools = Apply session hijacking countermeasures ‘Module 1 Page 1372 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Session Hijacking Module Flow ¢ Notwork Level Session 03 01 ~ Session Hijacking Concepts = 02 ae 04 Session Hijacking Tots 05 — Countermeasures Session Hijacking Concepts Familiarization with basic concepts related to session hijacking is important to attain a comprehensive understanding. This section explains what session hijacking is as well as the reasons why session hijacking succeeds. It also discusses the session hijacking process, packet analysis of a local session hijack, types of session hijacking, session hijacking in an Open Systems Interconnection (OS!) model, and differences between spoofing and hijacking. ‘Module 1 Page 373 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Session Hijacking What is Session Hijacking? |@ Session hijacking efes to.an attack in which an attacker selzes ‘conta! of a valid TCP communication session between two ‘computers 'As most authentications only occur atthe start of TCP ‘session this allows the atacker to gain access to’@ machine [Atackers can sniff al the traffic from the established TCP sessions and perform identity thet, information theft fraud, et. Te attacker stenle aval session 1D and uses it to authenticate himsel withthe server What is Session Hijacking? A web server sends a session identification token or key to a web Client after successful authentication. These session tokens differentiate multiple sessions that the server establishes with clients. Web servers use various mechanisms to generate random tokens and controls to secure the tokens during transmission. Session hijacking is an attack in which an attacker takes over a valid Transmission Control Protocol (TCP) communication session between two computers. Because most types of authentication are performed only at the start of a TCP session, an attacker can gain access to a machine while a session is in progress. Attackers can sniff all the traffic from established TCP sessions and perform identity theft, information theft, fraud, etc. A session hijacking attack exploits a session-token generation mechanism or token security controls so that the attacker can establish an unauthorized connection with a target server. The attacker can guess or steal a valid session ID, which identifies authenticated users, and use it to establish a session with the server. The web server responds to the attacker's requests under the impression that it is communicating with an authenticated user. Attackers can use session hijacking to launch various kinds of attacks, such as man-in-the- middle (MITM) and denial-of-service (DoS) attacks. In an MITM attack, an attacker places themselves between an authorized client and a server by performing session hijacking to ensure that information flowing in either direction passes through them. However, the client and server believe they are directly communicating with each other. Attackers can also sniff Sensitive information and disrupt sessions to launch a Dos attack. ‘Module 1 Page 376 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel Prohiatedthea Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Session Hijacking ‘credentla Transmission Credential Confiemation Session Setup Sexson Setup Data Request Data Transmission Data Tranemision Data Transmission attacker Figure 11.1: Example of session hijacking ‘Module 1 Page 1375 Ethical Making and Countermeasures Copyight © by E-Caunedl ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Session Hijacking Why is Session Hijacking Successful? Absence of account lockout for invalid {G0 todetiitasentontinaout session 1Ds Weak session-1D generation algorithm [Bh Most computers using 17/1” are for small session IDs ‘vulnerable ‘Most countermeasures do not work nsecare handing fsa os I, Why is Session Hijacking Successful? Session hijacking succeeds because of the following factors. Absence of account lockout for invalid session IDs: If a website does not implement account lockout, an attacker can make several attempts to connect with varying session IDs embedded in a genuine URL. The attacker can continue making attempts until the actual session ID is determined. This attack is also known as a brute-force attack. During a brute-force attack, the web server does not display a warning message or complaint, allowing the attacker to determine the valid session ID. ‘Weak session-ID generation algorithm or small session IDs: Most websites use linear algorithms to predict variables such as time or IP address for generating session IDs. By studying the sequential pattern and generating multiple requests, an attacker can easily narrow the search space necessary to forge a valid session ID. Even if a strong session-ID generation algorithm is used, an active session ID can be easily determined if the string is short. Insecure handling of session IDs: An attacker can retrieve stored session-ID information by misleading the user’s browser into visiting another site. Before the session expires, the attacker can exploit the information in many ways, such as Domain Name System. (DNS) poisoning, cross-site scripting exploitation, and the exploitation of a bug in the browser. Indefinite session timeout: Session IDs with an indefinite expiration time provides an attacker with unlimited time to guess a valid session ID. An example of this is the “remember me” option in many websites. The attacker can use static session IDs to the user's web account after capturing the user’s cookie file. The attacker can also perform ‘Module 1 Page 1376 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Session Hijacking session hijacking if they can break into a proxy server, which potentially logs or caches session IDs. «Most computers using TCP/Internet Protocol (IP) are vulnerable: All machines running TCP/IP are vulnerable to session hijacking because of the design flaws inherent in TCP/IP. + Most countermeasures do not work without encryption: It is easy to sniff session IDs in a flat network if transport security is not set up properly during the transmission of session ID cookies, even if a web application uses Secure Sockets Layer (SSL) encryption. An attacker's task becomes even easier if they capture session IDs containing actual login information. Module 1 Page 1377 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel Prohiated
You might also like
[FREE PDF sample] GCIH GIAC Certified Incident Handler All-in-One Exam Guide Nick Mitropoulos ebooks
PDF
No ratings yet
[FREE PDF sample] GCIH GIAC Certified Incident Handler All-in-One Exam Guide Nick Mitropoulos ebooks
41 pages
Computer Security
PDF
100% (1)
Computer Security
519 pages
312 50v12
PDF
No ratings yet
312 50v12
4 pages
Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021 (João Manuel R. S. Tavares, Paramartha Dutta Etc.)
PDF
100% (1)
Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021 (João Manuel R. S. Tavares, Paramartha Dutta Etc.)
630 pages
Module 6 System Hacking
PDF
100% (1)
Module 6 System Hacking
291 pages
DIS10.1 Ethical Hacking and Countermeasures
PDF
No ratings yet
DIS10.1 Ethical Hacking and Countermeasures
14 pages
11 Mwri A Penetration Testers Guide To The Azure Cloud v1.2
PDF
No ratings yet
11 Mwri A Penetration Testers Guide To The Azure Cloud v1.2
57 pages
Cloud Computing Security Tutorial
PDF
No ratings yet
Cloud Computing Security Tutorial
68 pages
Session Hijacking
PDF
No ratings yet
Session Hijacking
21 pages
Session Hijacking and Prevention Technique PDF
PDF
No ratings yet
Session Hijacking and Prevention Technique PDF
7 pages
Module 12 Evading IDS Firewall and Honeybots
PDF
No ratings yet
Module 12 Evading IDS Firewall and Honeybots
136 pages
Module 20 Cryptography
PDF
No ratings yet
Module 20 Cryptography
124 pages
Module 10 Denial of Service
PDF
No ratings yet
Module 10 Denial of Service
91 pages
Module 8 Sniffing
PDF
No ratings yet
Module 8 Sniffing
121 pages
Module 1 Introduction To Ethical Hacking
PDF
No ratings yet
Module 1 Introduction To Ethical Hacking
91 pages
Module 16 Hacking Wireless Networks
PDF
No ratings yet
Module 16 Hacking Wireless Networks
209 pages
Module 9 Social Engineering
PDF
No ratings yet
Module 9 Social Engineering
83 pages
Module 4 Enumeration
PDF
No ratings yet
Module 4 Enumeration
92 pages
Module 13 Hacking Web Server
PDF
100% (1)
Module 13 Hacking Web Server
117 pages
Module 3 Scanning Networks
PDF
No ratings yet
Module 3 Scanning Networks
154 pages
DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks PDF
PDF
No ratings yet
DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks PDF
123 pages
THM Hacking Encyclopedia
PDF
100% (1)
THM Hacking Encyclopedia
91 pages
CEH
PDF
No ratings yet
CEH
14 pages
Tomas Guardia - Geometria Diferencial (2007, Universidad Central de Venezuela)
PDF
No ratings yet
Tomas Guardia - Geometria Diferencial (2007, Universidad Central de Venezuela)
282 pages
Kerberos Architecture
PDF
No ratings yet
Kerberos Architecture
11 pages
Ethical Hacking 12-Sept
PDF
No ratings yet
Ethical Hacking 12-Sept
13 pages
CEH v12 Lesson 9 - Social Engineering Exploits
PDF
No ratings yet
CEH v12 Lesson 9 - Social Engineering Exploits
7 pages
Pentesting Report
PDF
No ratings yet
Pentesting Report
31 pages
EC-Council Certified Incident Handler
PDF
No ratings yet
EC-Council Certified Incident Handler
20 pages
Windows Security
PDF
100% (1)
Windows Security
20 pages
Advanced Web Hacking PDF
PDF
100% (1)
Advanced Web Hacking PDF
21 pages
CEH Brochure
PDF
No ratings yet
CEH Brochure
24 pages
70+ Comprehensive Cybersecurity Tools
PDF
No ratings yet
70+ Comprehensive Cybersecurity Tools
13 pages
Evasion Techniques and Breaching Defenses: Offensive Security
PDF
No ratings yet
Evasion Techniques and Breaching Defenses: Offensive Security
11 pages
CEH v10 Module 05 Vulnerability Analysis PDF
PDF
No ratings yet
CEH v10 Module 05 Vulnerability Analysis PDF
30 pages
EC-Council - CEHv8 Module 17 Evading IDS, Firewalls, and Honeypots Slide 2013
PDF
No ratings yet
EC-Council - CEHv8 Module 17 Evading IDS, Firewalls, and Honeypots Slide 2013
142 pages
CEH v6 Resource Guide: EC-Council
PDF
100% (1)
CEH v6 Resource Guide: EC-Council
196 pages
Honeypot Frameworks and Their Applications NG Pan Xiang 2018
PDF
No ratings yet
Honeypot Frameworks and Their Applications NG Pan Xiang 2018
88 pages
CEH v12 Lesson 4 - NTP, DNS & Other Network en
PDF
No ratings yet
CEH v12 Lesson 4 - NTP, DNS & Other Network en
83 pages
CPENT Brochure
PDF
No ratings yet
CPENT Brochure
13 pages
CST804 Ethical Hacking and Penetration Testing
PDF
No ratings yet
CST804 Ethical Hacking and Penetration Testing
170 pages
CEH Certified+Ethical+Hacker+Brochure
PDF
No ratings yet
CEH Certified+Ethical+Hacker+Brochure
26 pages
By Gopalsamy Rajendran
PDF
No ratings yet
By Gopalsamy Rajendran
19 pages
1 - Introduction - Week 1 - NS
PDF
No ratings yet
1 - Introduction - Week 1 - NS
46 pages
eJPT CheatSheet
PDF
100% (1)
eJPT CheatSheet
61 pages
Network Configuration
PDF
No ratings yet
Network Configuration
8 pages
Endpoint & Network Threat Hunting
PDF
100% (1)
Endpoint & Network Threat Hunting
78 pages
Offensive Enumeration in
PDF
No ratings yet
Offensive Enumeration in
13 pages
Perform A Web Penetration Test
PDF
No ratings yet
Perform A Web Penetration Test
197 pages
CEH v12 Lesson 11 - Compromising IoT & OT Plat
PDF
No ratings yet
CEH v12 Lesson 11 - Compromising IoT & OT Plat
23 pages
CEH v11 - Module 14
PDF
No ratings yet
CEH v11 - Module 14
287 pages
Cyber Security-Ethical Hacking: Letshack Foundation in Collaboration With 3girps Presents
PDF
No ratings yet
Cyber Security-Ethical Hacking: Letshack Foundation in Collaboration With 3girps Presents
4 pages
Network Monitoring Using AlienVault
PDF
No ratings yet
Network Monitoring Using AlienVault
15 pages
Network Forensics With Bro: Matthias Vallentin
PDF
No ratings yet
Network Forensics With Bro: Matthias Vallentin
23 pages
Bug Bounty
PDF
100% (2)
Bug Bounty
11 pages
Session Hijacking
PDF
No ratings yet
Session Hijacking
11 pages
session Hijacking
PDF
No ratings yet
session Hijacking
6 pages
Session Hijacking
PDF
No ratings yet
Session Hijacking
14 pages
Session Hijacking
PDF
No ratings yet
Session Hijacking
13 pages
Lesson 13_Session Hijacking
PDF
No ratings yet
Lesson 13_Session Hijacking
50 pages