TOPICS
 TCP Concepts-The 3 Way handshake
 Session hijacking
 Types
 Method
 Mitigations
 Tools
 Firesheep
The 3-way Handshake
What is Session Hijacking ?
 Session hijacking is when
an attacker gets access to
the session state of a
legitimate user.
 The attacker steals a valid
session ID which is used to
get into the system and
retrieve the data
3-Way Handshake
Session Hijacking
Session Hijacking
This is Spoofing not Hijacking
This is Hijacking
Types Of Session Hijacking
 Predictable session token
 Session sniffing
 Client side attacks (XSS, malicious JS codes, trojans
etc)
 Blind Hijack
 Man-in-the-middle (MITM)
Method (steps)
 Place yourself between the victim and the target
(you must be able to sniff the network)
 Monitor the flow of packets
 Predict the sequence number
 Optionally kill the connection to the victim’s machine
 Take over the session
 Start injecting packets to the target server
Mitigations
 Use a secure HTTPS protocol
 Use a VPN when connecting remotely
 Protect access to your own networks
 Limit exposure to untrusted networks
 Educate the employees
Tools
 Juggernaut
 Hunt
 TTY Watcher
 IP Watcher
 T-Sight
 Parros HTTP Hijacker
 DroidSheep for Android
 Firesheep (Firefox addon)
Firesheep
 Firesheep is a
free, open source, and
is now available for Mac
OS X and Windows.
 Linux support is on the
way.
Find it here-
https://github.com/codebutler/firesheep/download
s

Session hijacking

  • 2.
    TOPICS  TCP Concepts-The3 Way handshake  Session hijacking  Types  Method  Mitigations  Tools  Firesheep
  • 3.
  • 4.
    What is SessionHijacking ?  Session hijacking is when an attacker gets access to the session state of a legitimate user.  The attacker steals a valid session ID which is used to get into the system and retrieve the data
  • 5.
  • 6.
  • 7.
  • 8.
    This is Spoofingnot Hijacking
  • 9.
  • 10.
    Types Of SessionHijacking  Predictable session token  Session sniffing  Client side attacks (XSS, malicious JS codes, trojans etc)  Blind Hijack  Man-in-the-middle (MITM)
  • 11.
    Method (steps)  Placeyourself between the victim and the target (you must be able to sniff the network)  Monitor the flow of packets  Predict the sequence number  Optionally kill the connection to the victim’s machine  Take over the session  Start injecting packets to the target server
  • 12.
    Mitigations  Use asecure HTTPS protocol  Use a VPN when connecting remotely  Protect access to your own networks  Limit exposure to untrusted networks  Educate the employees
  • 13.
    Tools  Juggernaut  Hunt TTY Watcher  IP Watcher  T-Sight  Parros HTTP Hijacker  DroidSheep for Android  Firesheep (Firefox addon)
  • 14.
    Firesheep  Firesheep isa free, open source, and is now available for Mac OS X and Windows.  Linux support is on the way. Find it here- https://github.com/codebutler/firesheep/download s