Module 11: Session Hijacking
Module 11: Session Hijacking
Scenario
A session hijacking attack refers to the exploitation of a session token-generation mechanism or token security controls that enables an attacker to establish an unauthorized connection with a target server. The attacker guesses or steals a valid session ID (which identifies authenticated users) and uses it to establish a session with the server.
As an ethical hacker or penetration tester, you should understand different session hijacking concepts, how attackers perform application- and network-level session hijacking, and the various tools used to launch this kind of attack. You should also be able to implement security measures at both the application and network levels to protect your network from session hijacking. Application-level hijacking involves gaining control over the Hypertext Transfer Protocol (HTTP) user session by obtaining the session IDs. Network-level hijacking is prevented by packet encryption, which can be achieved with protocols such as IPsec, SSL, and SSH.
Objective
The objective of the lab is to perform session hijacking and other tasks that include, but are not limited to:
- Hijack a session by intercepting traffic between server and client
- Steal a user session ID by intercepting traffic
- Detect session hijacking attacks
Overview of Session Hijacking
Session hijacking can be either active or passive, depending on the degree of involvement of the attacker:
- Active session hijacking: An attacker finds an active session and takes it over
- Passive session hijacking: An attacker hijacks a session, and, instead of taking over, monitors and records all the traffic in that session
Lab Tasks
Ethical hackers or penetration testers use numerous tools and techniques to perform session hijacking on the target systems. Recommended labs that will assist you in learning various session hijacking techniques include:
Perform session hijacking
- Hijack a session using Zed Attack Proxy (ZAP)
- Intercept HTTP traffic using bettercap
Detect session hijacking
- Detect session hijacking using Wireshark
Comments
Post a Comment