Attacking Session Management
Professor Larry Heimann Web Application Security Information Systems
Attacking Session Management Professor Larry Heimann Web Application - - PowerPoint PPT Presentation
Attacking Session Management Professor Larry Heimann Web Application Security Information Systems Lab 3 Review on CSRF & Path Traversal Hacker Wall of Fame (Lab 3 members in italics) Jacob Buckheit (2x) Jenny Zhu Ti ff any Chen
Professor Larry Heimann Web Application Security Information Systems
Hacker Wall of Fame (Lab 3 members in italics)
session IDs for you
trouble will follow
measure of randomness
application after the user authenticates
it to join the active session
Generate strong tokens
extremely unlikely during the lifespan of any given token.
are tried-and-tested.
java.security.SecureRandom, not java.util.Random), and use recognized crypto libraries such as SHA1
Protect tokens throughout their lifecycle
cookies are used.
uses the POST method is preferred (but still not ideal).
for the same user should be expired.
Protect tokens throughout their lifecycle
HTTP cookies (to prevent some XSS attack payloads).
token, to stop session fixation attacks.
even if other flaws exist.