Module 11: Session Hijacking

 

Module 11: Session Hijacking

Scenario

A session hijacking attack refers to the exploitation of a session token-generation mechanism or token security controls that enables an attacker to establish an unauthorized connection with a target server. The attacker guesses or steals a valid session ID (which identifies authenticated users) and uses it to establish a session with the server.

As an ethical hacker or penetration tester, you should understand different session hijacking concepts, how attackers perform application- and network-level session hijacking, and the various tools used to launch this kind of attack. You should also be able to implement security measures at both the application and network levels to protect your network from session hijacking. Application-level hijacking involves gaining control over the Hypertext Transfer Protocol (HTTP) user session by obtaining the session IDs. Network-level hijacking is prevented by packet encryption, which can be achieved with protocols such as IPsec, SSL, and SSH.

Objective

The objective of the lab is to perform session hijacking and other tasks that include, but are not limited to:

  • Hijack a session by intercepting traffic between server and client
  • Steal a user session ID by intercepting traffic
  • Detect session hijacking attacks

Overview of Session Hijacking

Session hijacking can be either active or passive, depending on the degree of involvement of the attacker:

  • Active session hijacking: An attacker finds an active session and takes it over
  • Passive session hijacking: An attacker hijacks a session, and, instead of taking over, monitors and records all the traffic in that session

Lab Tasks

Ethical hackers or penetration testers use numerous tools and techniques to perform session hijacking on the target systems. Recommended labs that will assist you in learning various session hijacking techniques include:

  1. Perform session hijacking

    • Hijack a session using Zed Attack Proxy (ZAP)
    • Intercept HTTP traffic using bettercap
  2. Detect session hijacking

    • Detect session hijacking using Wireshark

Comments

Popular posts from this blog

Lab 1: Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools

Lab 5: Perform Cryptanalysis using Various Cryptanalysis Tools

Task 2: Perform OS Discovery using Nmap Script Engine (NSE)