2021 | OriginalPaper | Chapter
Hint
Swipe to navigate through the chapters of this book
Published in:
Recent Innovations in Computing
Session hijacking is the term used to describe the theft of session cookies, i.e., sniff the cookies and use those to impersonate the end user. A cookie is a small-sized text file sent by the Web server to the user’s browser and is store at the client side. When a user visits a Web site first time, the Web server generates a fresh cookie. The Web site uses that cookie to track the movements of an authorized user. Main threats of cookies are session fixation attack, cross-site scripting (XXS) attack, session sniffing attack, cookies cloning attack, and cookies controlling malware. The hacker sniffs the network traffic for cookies and uses same to impersonate the user. With performing session hijacking attack, the attacker acts as actual user on Web. In this paper, we are going to discuss some of the technique that helps in optimizing the cookie attacks in Web applications.
Please log in to get access to this content
To get access to this content you need the following product:
Advertisement
1.
go back to reference Acunetix: (n.d.). Types of XSS: Stored XSS, Reflected XSS and DOM-based XSS. (Acunetix). Retrieved January 18, 2019, from https://www.acunetix.com/websitesecurity/xss/ Acunetix: (n.d.). Types of XSS: Stored XSS, Reflected XSS and DOM-based XSS. (Acunetix). Retrieved January 18, 2019, from
https://www.acunetix.com/websitesecurity/xss/
2.
go back to reference Bisson, D.: Social Engineering Attacks to Watch Out For. (Tripwire) Retrieved from tripwire.com, 2015, March 23. https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-to-watch-out-for/ Bisson, D.: Social Engineering Attacks to Watch Out For. (Tripwire) Retrieved from tripwire.com, 2015, March 23.
https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-to-watch-out-for/
3.
go back to reference Braun, A.: What Are Supercookies, Zombie Cookies, and Evercookies, and are they a Threat (make tech easier), 2018, October 2. Retrieved from https://www.maketecheasier.com/supercookies-zombie-cookies-evercookies/ Braun, A.: What Are Supercookies, Zombie Cookies, and Evercookies, and are they a Threat (make tech easier), 2018, October 2. Retrieved from
https://www.maketecheasier.com/supercookies-zombie-cookies-evercookies/
4.
go back to reference Cross-site_Scripting_(XSS), 2018, June 5. Retrieved 1 7, 2019, from www.owasp.org: https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) Cross-site_Scripting_(XSS), 2018, June 5. Retrieved 1 7, 2019, from
www.owasp.org:
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
5.
go back to reference Dacosta, I., Chakradeo, S., Ahamad, M., Traynor, P.: One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens. Georgia Institute of Technology, School of Computer Science. Georgia (2012) Dacosta, I., Chakradeo, S., Ahamad, M., Traynor, P.: One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens. Georgia Institute of Technology, School of Computer Science. Georgia (2012)
6.
go back to reference Dutko, J.: Types of computer cookies. Retrieved January 15, 2019, from CRU Solutions, 2018, August 16. https://crusolutions.com/blog/how-types-of-computer-cookies-affect-your-online-privacy/ Dutko, J.: Types of computer cookies. Retrieved January 15, 2019, from CRU Solutions, 2018, August 16.
https://crusolutions.com/blog/how-types-of-computer-cookies-affect-your-online-privacy/
7.
go back to reference Endler, D.: Brute-Force Exploitation of Web Application Session IDs. iDefence The power of Intelligence, 40, Chantilly. iDEFENSE Inc, Virginia, United States of America, 2001, November 1. Endler, D.: Brute-Force Exploitation of Web Application Session IDs. iDefence The power of Intelligence, 40, Chantilly. iDEFENSE Inc, Virginia, United States of America, 2001, November 1.
8.
go back to reference Juels, A., Jakobsson, M., Jagatic, T.N.: Cache Cookies for Browser Authentication. In: 2006 IEEE Symposium on Security and Privacy (S&P'06), p. 5. IEEE, Berkeley/Oakland, CA, USA (2006). Juels, A., Jakobsson, M., Jagatic, T.N.: Cache Cookies for Browser Authentication. In: 2006 IEEE Symposium on Security and Privacy (S&P'06), p. 5. IEEE, Berkeley/Oakland, CA, USA (2006).
9.
go back to reference Kumar, V.: Three Tier Verification Technique to Foil Session Sidejacking Attempts. Second Asian Himalayas International Conference on Internet (AH-ICI). IEEE , Kathmandu, Nepal (2011) Kumar, V.: Three Tier Verification Technique to Foil Session Sidejacking Attempts. Second Asian Himalayas International Conference on Internet (AH-ICI). IEEE , Kathmandu, Nepal (2011)
10.
go back to reference Nathani, B.C., Adi, E.: Website vulnerability to session fixation attacks. J. Information Eng. App. II 7, 32–36 (2012) Nathani, B.C., Adi, E.: Website vulnerability to session fixation attacks. J. Information Eng. App. II
7, 32–36 (2012)
11.
go back to reference Palmer, C.: Secure Session Management with Cookies for Web. Retrieved October 14, 2018, from crypto.stanford.edu, 2008, September 10. https://crypto.stanford.edu/cs142/papers/web-session-management.pdf Palmer, C.: Secure Session Management with Cookies for Web. Retrieved October 14, 2018, from crypto.stanford.edu, 2008, September 10.
https://crypto.stanford.edu/cs142/papers/web-session-management.pdf
12.
go back to reference Park, J.S., Sandhu, R.: Secure Cookies on the Web. IEEE 4(4), 36–44 (2000) Park, J.S., Sandhu, R.: Secure Cookies on the Web. IEEE
4(4), 36–44 (2000)
13.
go back to reference Reflected cross-site scripting. (n.d.). (PortsWigger web security). Retrieved January 18, 2019, from https://portswigger.net/web-security/cross-site-scripting/reflected Reflected cross-site scripting. (n.d.). (PortsWigger web security). Retrieved January 18, 2019, from
https://portswigger.net/web-security/cross-site-scripting/reflected
14.
go back to reference Rouse, M.: supercookie. (TechTarget), 2017, February 28. Retrieved from https://searchsecurity.techtarget.com/definition/supercookie Rouse, M.: supercookie. (TechTarget), 2017, February 28. Retrieved from
https://searchsecurity.techtarget.com/definition/supercookie
15.
go back to reference Ruzicka, V.: Session Fixation Attack, 2017, February 20. Retrieved August 9, 2018, from www.vojtechruzicka.com. https://www.vojtechruzicka.com/session-fixation-attack/ Ruzicka, V.: Session Fixation Attack, 2017, February 20. Retrieved August 9, 2018, from
www.vojtechruzicka.com.
https://www.vojtechruzicka.com/session-fixation-attack/
16.
go back to reference Sathiyaseelan, A.M., Joseph, V.: A Proposed System for Preventing Session Hijacking with Modified One Time Cookie. IEEE, pp. 451–454, 2017, March Sathiyaseelan, A.M., Joseph, V.: A Proposed System for Preventing Session Hijacking with Modified One Time Cookie. IEEE, pp. 451–454, 2017, March
17.
go back to reference Singh, R., Kumar, D.S.: A study of cookies and threats to cookies. Int. J. Adv. Res. Comput. Sci. Softw. Eng. VI 3, 339–343 (2016) Singh, R., Kumar, D.S.: A study of cookies and threats to cookies. Int. J. Adv. Res. Comput. Sci. Softw. Eng. VI
3, 339–343 (2016)
18.
go back to reference Takahashi, H., Yasunaga, K., Mambo, M., Kim, K., Youm, H.Y.: Preventing Abuse of Cookies Stolen by XSS, pp. 85–89. CPS (Confrene Pulisher Services), Seoul, South Korea (2013) Takahashi, H., Yasunaga, K., Mambo, M., Kim, K., Youm, H.Y.: Preventing Abuse of Cookies Stolen by XSS, pp. 85–89. CPS (Confrene Pulisher Services), Seoul, South Korea (2013)
19.
go back to reference Techopedia: Data Theft, 2016, April 27. Retrieved from Techopedia.com: https://www.techopedia.com/definition/26274/data-theft Techopedia: Data Theft, 2016, April 27. Retrieved from Techopedia.com:
https://www.techopedia.com/definition/26274/data-theft
20.
go back to reference What are persistent cookies used for? (n.d.). Retrieved January 2019, 19, from allaboutcookies.org. https://www.allaboutcookies.org/cookies/persistent-cookies-used-for.html What are persistent cookies used for? (n.d.). Retrieved January 2019, 19, from allaboutcookies.org.
https://www.allaboutcookies.org/cookies/persistent-cookies-used-for.html
- Title
- Loop Holes in Cookies and Their Technical Solutions for Web Developers
- DOI
- https://doi.org/10.1007/978-981-15-8297-4_41
- Authors:
-
Talwinder Singh
Bilal Ahmad Mantoo
- Publisher
- Springer Singapore
- Sequence number
- 41