词条 | Session hijacking |
释义 |
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies[1] used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer (see HTTP cookie theft). After successfully stealing appropriate session cookies an adversary might use the [https://wunderwuzzi23.github.io/blog/passthecookie.html Pass the Cookie technique] to perform session hijacking. [1] A popular method is using source-routed IP packets. This allows an attacker at point B on the network to participate in a conversation between A and C by encouraging the IP packets to pass through B's machine. If source-routing is turned off, the attacker can use "blind" hijacking, whereby it guesses the responses of the two machines. Thus, the attacker can send a command, but can never see the response. However, a common command would be to set a password allowing access from elsewhere on the net. An attacker can also be "inline" between A and C using a sniffing program to watch the conversation. This is known as a "man-in-the-middle attack". History of HTTPHTTP protocol versions 0.8 and 0.9 lacked cookies and other features necessary for session hijacking. Version 0.9beta of Mosaic Netscape, released on October 13, 1994, supported cookies. Early versions of HTTP 1.0 did have some security weaknesses relating to session hijacking, but they were difficult to exploit due to the vagaries of most early HTTP 1.0 servers and browsers. As HTTP 1.0 has been designated as a fallback for HTTP 1.1 since the early 2000s—and as HTTP 1.0 servers are all essentially HTTP 1.1 servers the session hijacking problem has evolved into a nearly permanent security risk. The introduction of supercookies and other features with the modernized HTTP 1.1 has allowed for the hijacking problem to become an ongoing security problem. Webserver and browser state machine standardization has contributed to this ongoing security problem. MethodsThere are four main methods used to perpetrate a session hijack. These are:
After successfully acquiring appropriate session cookies an adversary might leverage the [https://wunderwuzzi23.github.io/blog/passthecookie.html Pass the Cookie technique] to perform session hijacking. ExploitsFiresheepIn October 2010, a Mozilla Firefox extension called Firesheep was released that made it easy for session hijackers to attack users of unencrypted public Wi-Fi. Websites like Facebook, Twitter, and any that the user adds to their preferences allow the Firesheep user to easily access private information from cookies and threaten the public Wi-Fi user's personal property.[4] Only months later, Facebook and Twitter responded by offering (and later requiring) HTTP Secure throughout.[5][6] WhatsApp snifferAn app named "WhatsApp Sniffer" was made available on Google Play in May 2012, able to display messages from other WhatsApp users connected to the same network as the app user.[7] At that time WhatsApp used an XMPP infrastructure with encryption, not plain-text communication.[8] DroidSheepDroidSheep is a simple Android tool for web session hijacking (sidejacking). It listens for HTTP packets sent via a wireless (802.11) network connection and extracts the session id from these packets in order to reuse them. DroidSheep can capture sessions using the libpcap library and supports: open (unencrypted) networks, WEP encrypted networks, and WPA/WPA2 encrypted networks (PSK only). This software uses libpcap and arpspoof.[9][10] The apk was made available on Google Play but it has been taken down by Google. CookieCadgerCookieCadger is a graphical Java app that automates sidejacking and replay of HTTP requests, to help identify information leakage from applications that use unencrypted GET requests. It is a cross-platform open-source utility based on the Wireshark suite which can monitor wired Ethernet, insecure Wi-Fi, or load a packet capture file for offline analysis. Cookie Cadger has been used to highlight the weaknesses of youth team sharing sites such as Shutterfly (used by AYSO soccer league) and TeamSnap.[11] PreventionMethods to prevent session hijacking include:
See also
References1. ^{{cite web|url=https://wunderwuzzi23.github.io/blog/passthecookie.html|title=Pivot to the Clouds using Pass the Cookie|author=wunderwuzzi23|work=Pass The Cookie}} 2. ^1 {{cite web|url=http://news.bbc.co.uk/2/hi/technology/6929258.stm|publisher=BBC News|date=August 3, 2007|title=Warning of webmail wi-fi hijack}} 3. ^{{cite web|url=http://www.codeword.xyz/2015/08/09/exploiting-android-users-for-fun-and-profit/|title=Exploiting Android Users for Fun and Profit|author=Rudis Muiznieks|work=The Code Word}} 4. ^{{cite news |url=http://www.h-online.com/open/news/item/Firefox-extension-steals-Facebook-Twitter-etc-sessions-1124596.html |title=Firefox extension steals Facebook, Twitter, etc. sessions |work=The H |date=25 October 2010 }} 5. ^{{cite news |url=http://www.h-online.com/security/news/item/Facebook-now-SSL-encrypted-throughout-1178190.html |title=Facebook now SSL-encrypted throughout |work=The H |date=27 January 2011 }} 6. ^{{cite news |url=http://www.h-online.com/security/news/item/Twitter-adds-Always-use-HTTPS-option-1209032.html |title=Twitter adds ‘Always use HTTPS’ option |work=The H |date=16 March 2011 }} 7. ^{{cite news |url=http://www.h-online.com/security/news/item/Sniffer-tool-displays-other-people-s-WhatsApp-messages-1574382.html |title=Sniffer tool displays other people's WhatsApp messages |work=The H |date=13 May 2012 }} 8. ^{{cite news |url=http://www.h-online.com/security/news/item/WhatsApp-no-longer-sends-plain-text-1674723.html |title=WhatsApp no longer sends plain text |work=The H |date=24 August 2012 }} 9. ^{{cite web |url=https://code.google.com/p/droidsheep/ |title=DroidSheep }} 10. ^{{cite web |url=http://droidsheep.de/ |title=DroidSheep Blog }} 11. ^{{cite web|url=https://www.motherjones.com/politics/2013/05/shutterfly-teamsnap-eteamz-ssl-hackers-kids-datal|title=How Shutterfly and Other Social Sites Leave Your Kids Vulnerable to Hackers|work=Mother Jones|date=3 May 2013}} 12. ^{{cite web|url=http://www.schneier.com/blog/archives/2010/10/firesheep.html|title=Schneier on Security: Firesheep|accessdate=29 May 2011|date=27 October 2010}} 13. ^{{cite journal | url = https://www.springer.com/computer/security+and+cryptology/book/978-3-642-41487-9 | title = Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials | first = Willem | last = Burgers |author2=Roel Verdult |author3=Marko van Eekelen | journal = Proceedings of the 18th Nordic Conference on Secure IT Systems (NordSec 2013) | year= 2013}} 14. ^See {{cite web|url=http://itc.virginia.edu/netbadge/logout.html|title=NetBadge: How To Log Out}} 15. ^See also {{cite web|url=http://www.becardsmart.org.uk/always_log_out|title=Be Card Smart Online - Always log out}} 3 : Computer network security|Computer security exploits|Web security exploits |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。