IIG University of Freiburg
Web Security, Summer Term 2012
Brocken Authentication and Session Management
- Dr. E. Benoist
Sommer Semester
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 1
Web Security, Summer Term 2012 Brocken Authentication and Session - - PowerPoint PPT Presentation
IIG University of Freiburg Web Security, Summer Term 2012 Brocken Authentication and Session Management Dr. E. Benoist Sommer Semester Web Security, Summer Term 2012 7 Broken Authentication and Session Management 1 Table of Contents
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 1
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 2
◮ Account credentials and sessions tokens are often not
◮ Risks
◮ Method of attack: use weaknesses in authentication
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 3
◮ Automated process of trial and error
cryptographic key, . . .
another value, and so on.
◮ Many systems allow the use of weak passwords
account!
◮ Same technic can be used to guess encryption keys
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 4
◮ Normal Brute Force
◮ Reverse Brute Force
dramatically increases.
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 5
◮ Attacker has the possibility to listen to the traffic of the
◮ Client connects to the HTTP server www.mysite.com
◮ Attacker receives following information
connection to the server)
◮ Attacker can use the cookie to be recognized as the
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 6
◮ Suppose the Victim wants to log on a web site
◮ If an attacker can listen to the information transfered
the Middle . . .
◮ Solution: Use challenge response
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 7
Examples of Challenge/Response systems
◮ UBS (Swiss Bank) login system
by the card
◮ No replay Attack is possible here, since the information
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 8
◮ Attacker creates a session on a web site
(SESSION ID=1234abcd5678)
regularly)
◮ Attacker sends this Session ID to the victim
He sends an email containing the reference to the following URL : http: //www.gmail.com/?page=...&SESSION_ID=1234abcd.
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 9
◮ The session can be transfered using two means:
◮ Targeted Web site receives the request from the victim
javascript or a CSS or anything)
◮ Next time the victim visits the target
◮ When the attacker checks the session he/she receives
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 10
◮ Do not accept preset or invalid session identifiers
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 11
◮ Credential/Session Prediction
◮ Rights are stored in a session, only the session id is used
◮ Guessing the Session ID permits to be the user
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 12
◮ Many web sites generate session ID with proprietary
computer specific variables)
◮ An attack can be:
identity of the next user!
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 13
◮ Can be exploited on a shared computing environment
◮ Suppose logout function sends the victim to site’s
logging-out
◮ Another user could go through the browser’s history and
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 14
◮ Authentication relies on secure communication and
◮ SSL should be the only option for all authenticated parts
◮ All credentials should be stored in hashed or encrypted
credentials
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 15
◮ Only use inbuilt session management mechanism
◮ Do not use “remember me” or home grown Single Sign
solutions
◮ Writing a robust and secure solution requires high
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 16
◮ Use a single authentication mechanism
◮ Do not make the mechanism overly complex
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 17
◮ Do not allow the login process to start from an
◮ Always start login from a second page
◮ Prevents credential or session stealing
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 18
◮ Ensure that every page has a logout link
◮ Logout should destroy the credentials
◮ Consider Human Factor
successfully
◮ Use a timeout period
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 19
◮ Ancillary authentication functions ?
◮ Example:
engineering
cities in Germany)
◮ Answers should never be stored clear text
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 20
◮ Do not rely on credentials that can be spoofed ◮ TCP/IP spoofing
◮ HTTP spoofing
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 21
◮ Do not send e-mails containing passwords
◮ Use limited-time-only random numbers to reset access
reset
◮ Be careful of allowing users to change e-mail
the change
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 22
◮ Attacks on Credentials are numerous
◮ Protection may be related with risk
◮ New development
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 23
◮ OWASP Top 10 - 2007
◮ A Guide for Building Secure Web Applications and Web
◮ Web Application Security Consortium: Threat
Web Security, Summer Term 2012 7 Broken Authentication and Session Management 24