SlideShare a Scribd company logo
1 of 32
Session Hijacking
Mohammad Amin Taheri
Email: taheri_m96@comp.iust.ac.ir
2
Seyyed Ali Ayati
Email: ayati_a@comp.iust.ac.ir
Agenda
▸ What Is Session?
▸ Introduction
▸ Session Hijacking Types
▸ Spoofing Types
▸ Obtaining Session IDs
▸ Tools
▸ Simulation
▸ Countermeasures
3
What Is Session?
▸ A session is a sequence of
network request-response
transactions.
▸ Provides identity information for
stateless services like HTTP.
4
What Is Session?
5
Agenda
▸ What Is Session?
▸ Introduction
▸ Session Hijacking Types
▸ Spoofing Types
▸ Obtaining Session IDs
▸ Tools
▸ Simulation
▸ Countermeasures
6
Introduction
7
8
Introduction
9
E-commerce applications that are vulnerable to session hijacking!
31%
Agenda
▸ What Is Session?
▸ Introduction
▸ Session Hijacking Types
▸ Spoofing Types
▸ Obtaining Session IDs
▸ Tools
▸ Simulation
▸ Countermeasures
10
Session Hijacking Types
Passive Session Hijacking02
Active Session Hijacking01
Hybrid Session Hijacking03
11
Active Session Hijacking
12
Passive Session Hijacking
13
Hybrid Session Hijacking
▸ The attacker uses both passive and active mode to complete the attack.
▸ This type of session hijacking relies on spoofing.
14
Agenda
▸ What Is Session?
▸ Introduction
▸ Session Hijacking Types
▸ Spoofing Types
▸ Obtaining Session IDs
▸ Tools
▸ Simulation
▸ Countermeasures
15
16
Spoofing Types
▸ Spoofing can be categorized to two types:
▹ Blind Spoofing Attack
▹ Non-Blind Spoofing Attack
17
Blind Spoofing Attack
▸ Problems:
▹ It’s very hard to guess the TCP sequence number
▹ The attacker might need to wait a long time to get success with this
type of attack.
18
Non-Blind Spoofing Attack
▸ Problems:
▹ It’s hard to implement in today’s network.
19
Agenda
▸ What Is Session?
▸ Introduction
▸ Session Hijacking Types
▸ Spoofing Types
▸ Obtaining Session IDs
▸ Tools
▸ Simulation
▸ Countermeasures
20
Obtaining Session IDs
▸ The session IDs can be found in place like:
▹ In the HTTP GET request that is made when clicking on the
embedded link on the web page.
▹ When any HTTP POST command is issued typically with a form that
posts data from client to the server. The session ID is hidden inside
the form in the hidden field.
▹ Also the cookies are used to hold session IDs.
21
Obtaining Session IDs
Misdirected Trust
This way attacker can steal the
session ID as the data is sent
back from server to the host.
This sort of attack relies
heavily on the vulnerability of
the web application.
Sniffing
Unencrypted traffic often has
session ID inside and attacker
can easily get the session ID.
Brute Forcing
Guessing the session ID’s or
by attempting different
session ID until it gets the
right one.
22
Agenda
▸ What Is Session?
▸ Introduction
▸ Session Hijacking Types
▸ Spoofing Types
▸ Obtaining Session IDs
▸ Tools
▸ Simulation
▸ Countermeasures
23
Tools
Some of the most common tools used for session
hijacking are:
▸ NetHunter
▸ T-Sight
▸ Juggernaut
▸ TTY Watcher
▸ Hamster
▸ Ferret
▸ Wireshark
▸ Ethereal
▸ Burp Suite
24
Agenda
▸ What Is Session?
▸ Introduction
▸ Session Hijacking Types
▸ Spoofing Types
▸ Obtaining Session IDs
▸ Tools
▸ Simulation
▸ Countermeasures
25
Simulation
26
Agenda
▸ What Is Session?
▸ Introduction
▸ Session Hijacking Types
▸ Spoofing Types
▸ Obtaining Session IDs
▸ Tools
▸ Simulation
▸ Countermeasures
27
Countermeasures
▸ Network Layer:
▹ Use of SSL at all time
▹ Use SSH for Remote
Connection
▹ HTTPS Connection Only
▸ Application Layer:
▹ Strong Session ID
▹ Encrypt The Session IDs
▹ Forced Log Out
▹ Time-Out
▹ Captcha Prevention Technique
28
Conclusion
▸ In this presentaion, we got familiar with:
▹ Session
▹ Session Hijacking
▹ Spoofing
▹ How to simulate
▹ How to prevent
29
References
▸ Kamal, Parves. State of the Art Survey on Session Hijacking. Global Journal of
Computer Science and Technology, [S.l.], Mar. 2016. ISSN 0975-4172.
30
Credits
Special thanks to all the people who helped us to prepare this
presentation:
▸ Dr. Zeinab Movahedi
▸ Helia Baradaran
31
32
THANKS!
Any questions?
You can find us at:
▸ ayati_a@comp.iust.ac.ir
▸ taheri_m96@comp.iust.ac.ir

More Related Content

What's hot

Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating systemSara Ali
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagiamansyal
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance SHIKHA GAUTAM
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.pptZaheer720515
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Sam Bowne
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 
Directory and discovery services
Directory and discovery servicesDirectory and discovery services
Directory and discovery servicesRamchandraRegmi
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented CommunicationDilum Bandara
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentationguest85a34f
 
Ds objects and models
Ds objects and modelsDs objects and models
Ds objects and modelsMayank Jain
 
Methods for handling deadlocks
Methods for handling deadlocksMethods for handling deadlocks
Methods for handling deadlocksA. S. M. Shafi
 
Denial of Service Attack Project
Denial of Service Attack ProjectDenial of Service Attack Project
Denial of Service Attack ProjectNadim Ebadi
 
Practical Byzantine Fault Tolernace
Practical Byzantine Fault TolernacePractical Byzantine Fault Tolernace
Practical Byzantine Fault TolernaceYongraeJo
 

What's hot (20)

Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating system
 
Load balancing
Load balancingLoad balancing
Load balancing
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Directory and discovery services
Directory and discovery servicesDirectory and discovery services
Directory and discovery services
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 
Kerberos
KerberosKerberos
Kerberos
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Deadlock ppt
Deadlock ppt Deadlock ppt
Deadlock ppt
 
Ds objects and models
Ds objects and modelsDs objects and models
Ds objects and models
 
Methods for handling deadlocks
Methods for handling deadlocksMethods for handling deadlocks
Methods for handling deadlocks
 
Denial of Service Attack Project
Denial of Service Attack ProjectDenial of Service Attack Project
Denial of Service Attack Project
 
Practical Byzantine Fault Tolernace
Practical Byzantine Fault TolernacePractical Byzantine Fault Tolernace
Practical Byzantine Fault Tolernace
 

Similar to A survey on Session Hijacking

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet BankingChiheb Chebbi
 
Adaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber AttacksAdaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber AttacksJermund Ottermo
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfslametarrokhim1
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxSohamChakraborty61
 
Cyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensiveCyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensivesidraasif9090
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information securityJayanth Vinay
 
Understanding Network Attacks and Session Hijacking.pdf
Understanding Network Attacks and Session Hijacking.pdfUnderstanding Network Attacks and Session Hijacking.pdf
Understanding Network Attacks and Session Hijacking.pdfUzairAhmad435046
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfHaris Chughtai
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacysoftware-engineering-book
 
SSH Keys: Security Asset or Liability?
SSH Keys: Security Asset or Liability?SSH Keys: Security Asset or Liability?
SSH Keys: Security Asset or Liability?Michael Thelander
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)Wail Hassan
 

Similar to A survey on Session Hijacking (20)

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
Adaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber AttacksAdaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber Attacks
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
Intrusion in computing
Intrusion in computingIntrusion in computing
Intrusion in computing
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensiveCyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensive
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
Understanding Network Attacks and Session Hijacking.pdf
Understanding Network Attacks and Session Hijacking.pdfUnderstanding Network Attacks and Session Hijacking.pdf
Understanding Network Attacks and Session Hijacking.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 
SSH Keys: Security Asset or Liability?
SSH Keys: Security Asset or Liability?SSH Keys: Security Asset or Liability?
SSH Keys: Security Asset or Liability?
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
 

Recently uploaded

(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

A survey on Session Hijacking

  • 2. Mohammad Amin Taheri Email: taheri_m96@comp.iust.ac.ir 2 Seyyed Ali Ayati Email: ayati_a@comp.iust.ac.ir
  • 3. Agenda ▸ What Is Session? ▸ Introduction ▸ Session Hijacking Types ▸ Spoofing Types ▸ Obtaining Session IDs ▸ Tools ▸ Simulation ▸ Countermeasures 3
  • 4. What Is Session? ▸ A session is a sequence of network request-response transactions. ▸ Provides identity information for stateless services like HTTP. 4
  • 6. Agenda ▸ What Is Session? ▸ Introduction ▸ Session Hijacking Types ▸ Spoofing Types ▸ Obtaining Session IDs ▸ Tools ▸ Simulation ▸ Countermeasures 6
  • 8. 8
  • 9. Introduction 9 E-commerce applications that are vulnerable to session hijacking! 31%
  • 10. Agenda ▸ What Is Session? ▸ Introduction ▸ Session Hijacking Types ▸ Spoofing Types ▸ Obtaining Session IDs ▸ Tools ▸ Simulation ▸ Countermeasures 10
  • 11. Session Hijacking Types Passive Session Hijacking02 Active Session Hijacking01 Hybrid Session Hijacking03 11
  • 14. Hybrid Session Hijacking ▸ The attacker uses both passive and active mode to complete the attack. ▸ This type of session hijacking relies on spoofing. 14
  • 15. Agenda ▸ What Is Session? ▸ Introduction ▸ Session Hijacking Types ▸ Spoofing Types ▸ Obtaining Session IDs ▸ Tools ▸ Simulation ▸ Countermeasures 15
  • 16. 16
  • 17. Spoofing Types ▸ Spoofing can be categorized to two types: ▹ Blind Spoofing Attack ▹ Non-Blind Spoofing Attack 17
  • 18. Blind Spoofing Attack ▸ Problems: ▹ It’s very hard to guess the TCP sequence number ▹ The attacker might need to wait a long time to get success with this type of attack. 18
  • 19. Non-Blind Spoofing Attack ▸ Problems: ▹ It’s hard to implement in today’s network. 19
  • 20. Agenda ▸ What Is Session? ▸ Introduction ▸ Session Hijacking Types ▸ Spoofing Types ▸ Obtaining Session IDs ▸ Tools ▸ Simulation ▸ Countermeasures 20
  • 21. Obtaining Session IDs ▸ The session IDs can be found in place like: ▹ In the HTTP GET request that is made when clicking on the embedded link on the web page. ▹ When any HTTP POST command is issued typically with a form that posts data from client to the server. The session ID is hidden inside the form in the hidden field. ▹ Also the cookies are used to hold session IDs. 21
  • 22. Obtaining Session IDs Misdirected Trust This way attacker can steal the session ID as the data is sent back from server to the host. This sort of attack relies heavily on the vulnerability of the web application. Sniffing Unencrypted traffic often has session ID inside and attacker can easily get the session ID. Brute Forcing Guessing the session ID’s or by attempting different session ID until it gets the right one. 22
  • 23. Agenda ▸ What Is Session? ▸ Introduction ▸ Session Hijacking Types ▸ Spoofing Types ▸ Obtaining Session IDs ▸ Tools ▸ Simulation ▸ Countermeasures 23
  • 24. Tools Some of the most common tools used for session hijacking are: ▸ NetHunter ▸ T-Sight ▸ Juggernaut ▸ TTY Watcher ▸ Hamster ▸ Ferret ▸ Wireshark ▸ Ethereal ▸ Burp Suite 24
  • 25. Agenda ▸ What Is Session? ▸ Introduction ▸ Session Hijacking Types ▸ Spoofing Types ▸ Obtaining Session IDs ▸ Tools ▸ Simulation ▸ Countermeasures 25
  • 27. Agenda ▸ What Is Session? ▸ Introduction ▸ Session Hijacking Types ▸ Spoofing Types ▸ Obtaining Session IDs ▸ Tools ▸ Simulation ▸ Countermeasures 27
  • 28. Countermeasures ▸ Network Layer: ▹ Use of SSL at all time ▹ Use SSH for Remote Connection ▹ HTTPS Connection Only ▸ Application Layer: ▹ Strong Session ID ▹ Encrypt The Session IDs ▹ Forced Log Out ▹ Time-Out ▹ Captcha Prevention Technique 28
  • 29. Conclusion ▸ In this presentaion, we got familiar with: ▹ Session ▹ Session Hijacking ▹ Spoofing ▹ How to simulate ▹ How to prevent 29
  • 30. References ▸ Kamal, Parves. State of the Art Survey on Session Hijacking. Global Journal of Computer Science and Technology, [S.l.], Mar. 2016. ISSN 0975-4172. 30
  • 31. Credits Special thanks to all the people who helped us to prepare this presentation: ▸ Dr. Zeinab Movahedi ▸ Helia Baradaran 31
  • 32. 32 THANKS! Any questions? You can find us at: ▸ ayati_a@comp.iust.ac.ir ▸ taheri_m96@comp.iust.ac.ir

Editor's Notes

  1. یک session نمونه ای از کنش های متقابل یک یوزر با یک وب اپلیکیشن است اما تاکید بر این موضوع در اینجا نمیتواند کمک زیادی در فهم قضیه نماید. در حال حاضر برای یک web session بهتر است از این باب وارد شویم: " session ساختاری از داده است که وب اپلیکیشن از آن برای نگهداری موقتی اطلاعات استفاده میکند. این اطلاعات موقتی فقط در زمانی که یوزر با وب اپلیکیشن در ارتباط است کارایی دارد و خصوصیات یوزر را بیان میکنند.
  2. Various security threats lurk around the internet. Especially in this age of the Internet, everything is connected to the Internet. Online E-commerce heavily relies on online transactions for example banks provide users an easy way of managing their accounts online. As the sensitive information passes around the internet the confidentiality, integrity, and availability of such information become increasingly hard to protect.
  3. One needs to develop a capable defensive mechanism to keep all the threats that pose threats to the CIA (Confidentiality, Integrity, and availability) of the information. Security threats like man-in-the-middle attack, sniffing, Denial-of-service attack, ARP spoofing, session hijacking are some of the most common attacks performed daily by numerous attackers around the world on the Internet.
  4. A recent study performed by Stake™ has shown that 31% of E-commerce applications are vulnerable to session hijacking.
  5. zsdf
  6. In active session hijacking the attacker tries take over active session between the user and the server by either putting off the valid user from the connection and start making connection to the server masquerading as the valid user. The way an attacker puts off the valid user is by putting the active user out of the connection via the denial of service attack. Before making the valid user out of the valid active session he/she captures data that is sent back and forth between the user and the server by putting himself in between the connection between the connections and sniffing the data by packet capturing tool like Wireshark.
  7. In passive session hijacking, the attacker captures all the packets between the user and the server and it sends out a valid packet to the user masquerading as the server and same way sending a packet to the server masquerading as a user. It’s also referred to as a session replay attack where the attacker replays packets captured from the user and sends them to the server. The disadvantage of such an attack is that the attack is valid until there is a valid session still in continuation. If for some reason the server resets the connection or the user logs off from the server the session will be terminated.
  8. In hybrid session hijacking the attacker uses both passive and active mode to complete the attack. The attacker monitors the traffic pattern between the user and the server and waits for the right session to take over.
  9. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. TCP three-way handshake
  10. In blind spoofing attack the attacker attacks the target machine without tempering with the connection. It simply captures all the packets between the client and the server and it tries to guess the TCP packet sequence number so that it can authenticate with the server.
  11. In non-blind spoofing attack the attacker can actually monitor the traffic between the user and the target server. This way it’s easy for the attacker to guess the next packet in case it wants to guess the TCP sequence number of the next packet.
  12. HTML injection or CSS (Cross Site Scripting) attack to misdirect valid traffic to the attacker.