SlideShare a Scribd company logo
1 of 21
Download to read offline
By: Nileshwari Desai
Roll No: A 216
 INTRODUCTION
 WHAT IS A COOKIE
 DIFFERENT TYPES OF COOKIES
 WHAT IS A COOKIE REPLAY ATTACK
 HOW IT WORKS?
 COOKIE IN-SECURITY PERSPECTIVE
 CONCLUSION
 REFERNCES
 Internet security is not one to be taken lightly. There is
a saying that Internet Security is a trade-off between
security and usability. And that’s true for the most
part, but luckily protection against replay attacks does
not hinder usability—it’s almost completely
transparent to the end users.
 A cookie, also known as an HTTP cookie, web cookie,
or browser cookie, is a small piece of data sent from a
website and stored in a user's web browser while the user is
browsing that website.
 Every time the user loads the website, the browser sends
the cookie back to the server to notify the website of the
user's previous activity.
 Cookies were designed to be a reliable mechanism for
websites to remember state ful information (such as items
in a shopping cart) or to record the user's browsing activity
(including clicking particular buttons, logging in, or
recording which pages were visited by the user as far back
as months or years ago).
What it is?
 Small piece of information stored in client system.
 Transferred back and forth between Server and
browser.
 Keeps the state of the session active.
 A user's session cookie (also known as an in-memory
cookie or transient cookie) for a website exists in
temporary memory only while the user is reading and
navigating the website. When an expiry date or validity
interval is not set at cookie creation time, a session
cookie is created.
 Web browsers normally delete session cookies when
the user closes the browser.
 A persistent cookie will outlast user sessions. If a
persistent cookie has its Max-Age set to 1 year (for
example), then, during that year, the initial value set in
that cookie would be sent back to the server every time
the user visited the server.
 This could be used to record a vital piece of
information such as how the user initially came to this
website. For this reason, persistent cookies are also
called tracking cookies.
 A secure cookie has the secure attribute enabled and is
only used via HTTPS, ensuring that the cookie is
always encrypted when transmitting from client to
server.
 This makes the cookie less likely to be exposed to
cookie theft via eavesdropping. In addition to that, all
cookies are subject to browser's same-origin policy.
 The Http Only attribute is supported by most modern
browsers. On a supported browser, an Http Only
session cookie will be used only when transmitting
HTTP (or HTTPS) requests, thus restricting access
from other, non-HTTP APIs (such as JavaScript).
 This restriction mitigates but does not eliminate the
threat of session cookie theft via cross-site
scripting (XSS). This feature applies only to session-
management cookies, and not other browser cookies.
 First-party cookies are cookies that belong to the same domain that is
shown in the browser's address bar
 Third-party cookies are cookies that belong to domains different from
the one shown in the address bar. Web pages can feature content from
third-party domains, which opens up the potential for tracking the
user's browsing history.
 As an example, suppose a user visits www.example1.com. This web site
contains an advert from ad.foxytracking.com, which, when
downloaded, sets a cookie belonging to the adverts' domain
(ad.foxytracking.com). Then, the user visits another
website, www.example2.com, which also contains an advert
from ad.foxytracking.com, and which also sets a cookie belonging to
that domain (ad.foxytracking.com). Eventually, both of these cookies
will be sent to the advertiser when loading their ads or visiting their
website. The advertiser can then use these cookies to build up a
browsing history of the user across all the websites that have ads from
this advertiser.
 A "super cookie" is a cookie with an origin of a Top-Level
Domain (such as .com) or a Public Suffix (such as .co.in). It
is important that super cookies are blocked by browsers,
due to the security holes they introduce. If unblocked, an
attacker in control of a malicious website could set a super
cookie and potentially disrupt or impersonate legitimate
user requests to another website that shares the same Top-
Level Domain or Public Suffix as the malicious website.
 For example, a super cookie with an origin of .com, could
maliciously affect a request made to example.com, even if
the cookie did not originate from example.com. This can be
used to fake logins or change user information.
 Some cookies are automatically recreated after a user
has deleted them; these are called zombie cookies.
 This is accomplished by a script storing the content of
the cookie in some other locations, such as the local
storage available to Flash content, HTML5 storages
and other client side mechanisms, and then recreating
the cookie from backup stores when the cookie's
absence is detected.
 Essentially a security breach whereby someone poses
as someone else using some unique piece of data the
user supplied/was issued to/from the Web server. It’s
kind of similar to a man-in-the-middle attack.
 Replay attacks are often one thing that programmers
forget to protect against. This really is quite a worry
since I want my identity to be safe online and I’m sure
you do, too.
 Browser requests a page on server.
 Then server sends back a cookie with the requested
page to the browser.
 The browser sends the cookie to the server with
subsequent requests.
 Point to be noted that the user will be identified by
the server exclusively on the cookie that is returned.
1. John logs into example.org.
2. Server issues John a cookie with value of 12345.
3. John revisits example.org again and is logged in.
4. Evil Joe looked at the request and steals the cookie.
5. Joe visits example.org which logs him in as John.
 Due to the very nature of the attack it isn’t possible to
100% protect against it, it’s inherently insecure. But
there are ways to increase the security, and that’s to
add another step after (3) above:
 Server reissues John a cookie with value of 67891.
 It’s called token regeneration. We have recognized that
John has a valid cookie, logged the user in, removed
their old cookie and recreate a new one that no one
else should know. Even if Joe had the old cookie it’s no
longer valid and has to perform the same actions as (4)
in the original way.
 Another method is to add some kind of time
restriction, so only make the cookie valid for a certain
amount of days. So if Joe happens to stumble across
the cookie after a month he should no longer be able
to login as John.
 Another to add in which browser John is using, the
chances of John using exactly the same as Joe is
unlikely.
Cookie related attacks
 Cookie Poisoning
→Tampering or changing the cookie
→Relatively difficult to construct the cookie similar
to the original one
→The difficulty depends on the complexity of
cookie generation mechanism
 Cookie Replay
→Simply reuse a valid cookie
→Relatively simple to get a valid cookie through
sniffing
 Use HTTPs while browsing (If secure cookie is
implemented)- First level defense in depth.
 Cookie Life time- Be strict in giving age to cookie.
 Secure Cryptography: Don’t innovate, use existing
best proven.
 Persistent Cookie- Avoid it.
 We studied how basically a cookie works and also
explored different types of cookies. The replay attack
was discussed and the different types of cookie replay
attacks were acknowledged . Also the preventive
measures for the attack were discussed.
Cookie replay attack  unit wise presentation

More Related Content

What's hot

Addressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using XamarinAddressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using XamarinAlec Tucker
 
XML & XPath Injections
XML & XPath InjectionsXML & XPath Injections
XML & XPath InjectionsAMol NAik
 
Attacking thru HTTP Host header
Attacking thru HTTP Host headerAttacking thru HTTP Host header
Attacking thru HTTP Host headerSergey Belov
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015CODE BLUE
 
Cross Site Scripting(XSS)
Cross Site Scripting(XSS)Cross Site Scripting(XSS)
Cross Site Scripting(XSS)Nabin Dutta
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scriptingkinish kumar
 
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
[Hitcon 2020 CTI Village] Threat Hunting to Campaign TrackingSu Steve
 
A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...Noppadol Songsakaew
 
STORED XSS IN DVWA
STORED XSS IN DVWASTORED XSS IN DVWA
STORED XSS IN DVWARutvik patel
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)Manish Kumar
 
All You Need is One - A ClickOnce Love Story - Secure360 2015
All You Need is One -  A ClickOnce Love Story - Secure360 2015All You Need is One -  A ClickOnce Love Story - Secure360 2015
All You Need is One - A ClickOnce Love Story - Secure360 2015NetSPI
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101Jannis Kirschner
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting GuideDaisuke_Dan
 
XSS - Do you know EVERYTHING?
XSS - Do you know EVERYTHING?XSS - Do you know EVERYTHING?
XSS - Do you know EVERYTHING?Yurii Bilyk
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 

What's hot (20)

Xss ppt
Xss pptXss ppt
Xss ppt
 
Addressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using XamarinAddressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using Xamarin
 
XML & XPath Injections
XML & XPath InjectionsXML & XPath Injections
XML & XPath Injections
 
Attacking thru HTTP Host header
Attacking thru HTTP Host headerAttacking thru HTTP Host header
Attacking thru HTTP Host header
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
 
SQL Injection
SQL Injection SQL Injection
SQL Injection
 
Cross Site Scripting(XSS)
Cross Site Scripting(XSS)Cross Site Scripting(XSS)
Cross Site Scripting(XSS)
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
 
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
 
A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...
 
jQuery
jQueryjQuery
jQuery
 
STORED XSS IN DVWA
STORED XSS IN DVWASTORED XSS IN DVWA
STORED XSS IN DVWA
 
PHP Security
PHP SecurityPHP Security
PHP Security
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
 
All You Need is One - A ClickOnce Love Story - Secure360 2015
All You Need is One -  A ClickOnce Love Story - Secure360 2015All You Need is One -  A ClickOnce Love Story - Secure360 2015
All You Need is One - A ClickOnce Love Story - Secure360 2015
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting Guide
 
XSS - Do you know EVERYTHING?
XSS - Do you know EVERYTHING?XSS - Do you know EVERYTHING?
XSS - Do you know EVERYTHING?
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 

Viewers also liked

Bridging the Systemic and Semantic Spheres
Bridging the Systemic and Semantic SpheresBridging the Systemic and Semantic Spheres
Bridging the Systemic and Semantic SpheresHelene Finidori
 
John hughes ppt
John hughes pptJohn hughes ppt
John hughes pptSim Grewal
 
12 0516 City Of Schenectady Md Csresc V2
12 0516 City Of Schenectady Md Csresc V212 0516 City Of Schenectady Md Csresc V2
12 0516 City Of Schenectady Md Csresc V2Mark De Chiro
 
Copy the names of insects
Copy the names of insectsCopy the names of insects
Copy the names of insectsThila Thilaga
 
My list for year 2012
My list for year 2012My list for year 2012
My list for year 2012henrikalm
 
Austur-Evrópa
Austur-EvrópaAustur-Evrópa
Austur-Evrópageorgb2789
 
Birthday Parties eNotebook
Birthday Parties eNotebookBirthday Parties eNotebook
Birthday Parties eNotebookClaretcarat
 
pendidikan jasmani purba & renaisance
pendidikan jasmani purba & renaisancependidikan jasmani purba & renaisance
pendidikan jasmani purba & renaisanceIsmi Ishak
 
Оборот There is there are
Оборот There is there areОборот There is there are
Оборот There is there areshpinat
 
Cimigo net citizens-2012
Cimigo net citizens-2012Cimigo net citizens-2012
Cimigo net citizens-2012Bui Hang
 
Working@distance
Working@distanceWorking@distance
Working@distanceSara Wyke
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных креселAndreykireenkov
 
Gardening e notebook
Gardening e notebookGardening e notebook
Gardening e notebookClaretcarat
 
Tech and Government - Procurement stats
Tech and Government - Procurement statsTech and Government - Procurement stats
Tech and Government - Procurement statsPaul Matthews
 

Viewers also liked (20)

Infectious // August // 2011
Infectious // August // 2011Infectious // August // 2011
Infectious // August // 2011
 
Bridging the Systemic and Semantic Spheres
Bridging the Systemic and Semantic SpheresBridging the Systemic and Semantic Spheres
Bridging the Systemic and Semantic Spheres
 
Acm
AcmAcm
Acm
 
John hughes ppt
John hughes pptJohn hughes ppt
John hughes ppt
 
12 0516 City Of Schenectady Md Csresc V2
12 0516 City Of Schenectady Md Csresc V212 0516 City Of Schenectady Md Csresc V2
12 0516 City Of Schenectady Md Csresc V2
 
Copy the names of insects
Copy the names of insectsCopy the names of insects
Copy the names of insects
 
My list for year 2012
My list for year 2012My list for year 2012
My list for year 2012
 
Introduction to libel
Introduction to libel Introduction to libel
Introduction to libel
 
Tx TB
Tx TBTx TB
Tx TB
 
Yeah
YeahYeah
Yeah
 
Austur-Evrópa
Austur-EvrópaAustur-Evrópa
Austur-Evrópa
 
Birthday Parties eNotebook
Birthday Parties eNotebookBirthday Parties eNotebook
Birthday Parties eNotebook
 
pendidikan jasmani purba & renaisance
pendidikan jasmani purba & renaisancependidikan jasmani purba & renaisance
pendidikan jasmani purba & renaisance
 
Оборот There is there are
Оборот There is there areОборот There is there are
Оборот There is there are
 
Cimigo net citizens-2012
Cimigo net citizens-2012Cimigo net citizens-2012
Cimigo net citizens-2012
 
Working@distance
Working@distanceWorking@distance
Working@distance
 
Flash bb
Flash bbFlash bb
Flash bb
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных кресел
 
Gardening e notebook
Gardening e notebookGardening e notebook
Gardening e notebook
 
Tech and Government - Procurement stats
Tech and Government - Procurement statsTech and Government - Procurement stats
Tech and Government - Procurement stats
 

Similar to Cookie replay attack unit wise presentation

Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet CookiesRitika Barethia
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookiesanita gouda
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakePiwik PRO
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 EricZhuZhengyi
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanismJivan Nepali
 
Cookiejacking2011 final
Cookiejacking2011 finalCookiejacking2011 final
Cookiejacking2011 finalsebjoh
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies TrackingAK DigiHub
 
Enterprise java unit-2_chapter-2
Enterprise  java unit-2_chapter-2Enterprise  java unit-2_chapter-2
Enterprise java unit-2_chapter-2sandeep54552
 
Cookie testing
Cookie testingCookie testing
Cookie testingBugRaptors
 
Session tracking in servlets
Session tracking in servletsSession tracking in servlets
Session tracking in servletsvishal choudhary
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and SessionKoraStats
 
Http only cookie
Http only cookieHttp only cookie
Http only cookiefool2fish
 

Similar to Cookie replay attack unit wise presentation (20)

Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
Cookies
CookiesCookies
Cookies
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanism
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Cookiejacking2011 final
Cookiejacking2011 finalCookiejacking2011 final
Cookiejacking2011 final
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies Tracking
 
Enterprise java unit-2_chapter-2
Enterprise  java unit-2_chapter-2Enterprise  java unit-2_chapter-2
Enterprise java unit-2_chapter-2
 
Cookies-PHP
Cookies-PHPCookies-PHP
Cookies-PHP
 
Cookie testing
Cookie testingCookie testing
Cookie testing
 
Session tracking in servlets
Session tracking in servletsSession tracking in servlets
Session tracking in servlets
 
Cookies
CookiesCookies
Cookies
 
Cookies may be set by the website you are visiting
Cookies may be set by the website you are visitingCookies may be set by the website you are visiting
Cookies may be set by the website you are visiting
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
 
Http only cookie
Http only cookieHttp only cookie
Http only cookie
 

More from Nilu Desai

data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacksNilu Desai
 
Adversarial search
Adversarial searchAdversarial search
Adversarial searchNilu Desai
 
collaborative study on the cloud
collaborative study on the cloudcollaborative study on the cloud
collaborative study on the cloudNilu Desai
 
digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS securityNilu Desai
 
deadlock prevention
deadlock preventiondeadlock prevention
deadlock preventionNilu Desai
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactionsNilu Desai
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 

More from Nilu Desai (7)

data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacks
 
Adversarial search
Adversarial searchAdversarial search
Adversarial search
 
collaborative study on the cloud
collaborative study on the cloudcollaborative study on the cloud
collaborative study on the cloud
 
digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS security
 
deadlock prevention
deadlock preventiondeadlock prevention
deadlock prevention
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Cookie replay attack unit wise presentation

  • 2.  INTRODUCTION  WHAT IS A COOKIE  DIFFERENT TYPES OF COOKIES  WHAT IS A COOKIE REPLAY ATTACK  HOW IT WORKS?  COOKIE IN-SECURITY PERSPECTIVE  CONCLUSION  REFERNCES
  • 3.  Internet security is not one to be taken lightly. There is a saying that Internet Security is a trade-off between security and usability. And that’s true for the most part, but luckily protection against replay attacks does not hinder usability—it’s almost completely transparent to the end users.
  • 4.  A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is a small piece of data sent from a website and stored in a user's web browser while the user is browsing that website.  Every time the user loads the website, the browser sends the cookie back to the server to notify the website of the user's previous activity.  Cookies were designed to be a reliable mechanism for websites to remember state ful information (such as items in a shopping cart) or to record the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited by the user as far back as months or years ago).
  • 5. What it is?  Small piece of information stored in client system.  Transferred back and forth between Server and browser.  Keeps the state of the session active.
  • 6.  A user's session cookie (also known as an in-memory cookie or transient cookie) for a website exists in temporary memory only while the user is reading and navigating the website. When an expiry date or validity interval is not set at cookie creation time, a session cookie is created.  Web browsers normally delete session cookies when the user closes the browser.
  • 7.  A persistent cookie will outlast user sessions. If a persistent cookie has its Max-Age set to 1 year (for example), then, during that year, the initial value set in that cookie would be sent back to the server every time the user visited the server.  This could be used to record a vital piece of information such as how the user initially came to this website. For this reason, persistent cookies are also called tracking cookies.
  • 8.  A secure cookie has the secure attribute enabled and is only used via HTTPS, ensuring that the cookie is always encrypted when transmitting from client to server.  This makes the cookie less likely to be exposed to cookie theft via eavesdropping. In addition to that, all cookies are subject to browser's same-origin policy.
  • 9.  The Http Only attribute is supported by most modern browsers. On a supported browser, an Http Only session cookie will be used only when transmitting HTTP (or HTTPS) requests, thus restricting access from other, non-HTTP APIs (such as JavaScript).  This restriction mitigates but does not eliminate the threat of session cookie theft via cross-site scripting (XSS). This feature applies only to session- management cookies, and not other browser cookies.
  • 10.  First-party cookies are cookies that belong to the same domain that is shown in the browser's address bar  Third-party cookies are cookies that belong to domains different from the one shown in the address bar. Web pages can feature content from third-party domains, which opens up the potential for tracking the user's browsing history.  As an example, suppose a user visits www.example1.com. This web site contains an advert from ad.foxytracking.com, which, when downloaded, sets a cookie belonging to the adverts' domain (ad.foxytracking.com). Then, the user visits another website, www.example2.com, which also contains an advert from ad.foxytracking.com, and which also sets a cookie belonging to that domain (ad.foxytracking.com). Eventually, both of these cookies will be sent to the advertiser when loading their ads or visiting their website. The advertiser can then use these cookies to build up a browsing history of the user across all the websites that have ads from this advertiser.
  • 11.  A "super cookie" is a cookie with an origin of a Top-Level Domain (such as .com) or a Public Suffix (such as .co.in). It is important that super cookies are blocked by browsers, due to the security holes they introduce. If unblocked, an attacker in control of a malicious website could set a super cookie and potentially disrupt or impersonate legitimate user requests to another website that shares the same Top- Level Domain or Public Suffix as the malicious website.  For example, a super cookie with an origin of .com, could maliciously affect a request made to example.com, even if the cookie did not originate from example.com. This can be used to fake logins or change user information.
  • 12.  Some cookies are automatically recreated after a user has deleted them; these are called zombie cookies.  This is accomplished by a script storing the content of the cookie in some other locations, such as the local storage available to Flash content, HTML5 storages and other client side mechanisms, and then recreating the cookie from backup stores when the cookie's absence is detected.
  • 13.  Essentially a security breach whereby someone poses as someone else using some unique piece of data the user supplied/was issued to/from the Web server. It’s kind of similar to a man-in-the-middle attack.  Replay attacks are often one thing that programmers forget to protect against. This really is quite a worry since I want my identity to be safe online and I’m sure you do, too.
  • 14.  Browser requests a page on server.  Then server sends back a cookie with the requested page to the browser.  The browser sends the cookie to the server with subsequent requests.  Point to be noted that the user will be identified by the server exclusively on the cookie that is returned.
  • 15. 1. John logs into example.org. 2. Server issues John a cookie with value of 12345. 3. John revisits example.org again and is logged in. 4. Evil Joe looked at the request and steals the cookie. 5. Joe visits example.org which logs him in as John.
  • 16.  Due to the very nature of the attack it isn’t possible to 100% protect against it, it’s inherently insecure. But there are ways to increase the security, and that’s to add another step after (3) above:  Server reissues John a cookie with value of 67891.  It’s called token regeneration. We have recognized that John has a valid cookie, logged the user in, removed their old cookie and recreate a new one that no one else should know. Even if Joe had the old cookie it’s no longer valid and has to perform the same actions as (4) in the original way.
  • 17.  Another method is to add some kind of time restriction, so only make the cookie valid for a certain amount of days. So if Joe happens to stumble across the cookie after a month he should no longer be able to login as John.  Another to add in which browser John is using, the chances of John using exactly the same as Joe is unlikely.
  • 18. Cookie related attacks  Cookie Poisoning →Tampering or changing the cookie →Relatively difficult to construct the cookie similar to the original one →The difficulty depends on the complexity of cookie generation mechanism  Cookie Replay →Simply reuse a valid cookie →Relatively simple to get a valid cookie through sniffing
  • 19.  Use HTTPs while browsing (If secure cookie is implemented)- First level defense in depth.  Cookie Life time- Be strict in giving age to cookie.  Secure Cryptography: Don’t innovate, use existing best proven.  Persistent Cookie- Avoid it.
  • 20.  We studied how basically a cookie works and also explored different types of cookies. The replay attack was discussed and the different types of cookie replay attacks were acknowledged . Also the preventive measures for the attack were discussed.