Common Attack Pattern Enumeration and Classification
A Community Resource for Identifying and Understanding Attacks
This type of attack involves an adversary that exploits weaknesses in an application's use of sessions in performing authentication. The advarsary is able to steal or manipulate an active session and use it to gain unathorized access to the application.
If an application is leveraging improper authentiction, then there is a high likelihood that it will be found and exploited. The prevelance of automated analysis toold have made identifying these types of weaknesses achievable by even the most basic adversary. Once identified, this can often be exploited with minimal trial and error.
Skill or Knowledge Level: Low
Exploiting a poorly protected identity token is a well understood attack with many helpful resources available.
The adversary must have the ability to communicate with the application over the network.
Properly encrypt and sign identity tokens in transit, and uses industry standarad session key generation mechanisms that utilize high amount of entropy to generate the session key. Many standard web and application servers will perform this task on your behalf. Utilize a session timeout for all sessions. If the user does not explicitly logout, terminate their session after this period of inactivity. If the user logs back in then a new session key should be generated.
More information is available — Please select a different filter.