Session Fixation lesson plan and solution edited
git-svn-id: http://webgoat.googlecode.com/svn/trunk/webgoat@339 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
parent
c001a67b95
commit
5a0e7a5d7a
@ -11,14 +11,15 @@ How to steal a session with a 'Session Fixation'
|
|||||||
</p>
|
</p>
|
||||||
A user is recognized by the server by an unique Session ID. If a
|
A user is recognized by the server by an unique Session ID. If a
|
||||||
user has logged in and is authorized he does not have to
|
user has logged in and is authorized he does not have to
|
||||||
reauhorize when he revisits the application as the user is recognized
|
reauthorize when he revisits the application as the user is recognized
|
||||||
by the Session ID. In some applications it is possible to deliver
|
by the Session ID. In some applications it is possible to deliver
|
||||||
the Session ID in the Get-Request. Here is where the attack starts.
|
the Session ID in the Get-Request. Here is where the attack starts.
|
||||||
<br><br>
|
<br><br>
|
||||||
An attacker can send a hyperlink to a victim with a choosen Session ID.
|
An attacker can send a hyperlink to a victim with a chosen Session ID.
|
||||||
This can be done for example by a phishing mail.
|
This can be done for example by a prepared mail which looks like an
|
||||||
If the victim clicks on the link and loggs in he is authorized
|
official mail from the application administrator.
|
||||||
by the Session ID the attacker has choosen. The attacker
|
If the victim clicks on the link and logs in he is authorized
|
||||||
|
by the Session ID the attacker has chosen. The attacker
|
||||||
can visit the page with the same ID and is recognized as the victim and
|
can visit the page with the same ID and is recognized as the victim and
|
||||||
gets logged in without authorization.
|
gets logged in without authorization.
|
||||||
</div>
|
</div>
|
||||||
|
@ -15,16 +15,17 @@ How to steal a session with a 'Session Fixation'
|
|||||||
<p><b>How the attacks works:</b><br/>
|
<p><b>How the attacks works:</b><br/>
|
||||||
A user is recognized by the server by an unique
|
A user is recognized by the server by an unique
|
||||||
Session ID. If a user has logged in and is authorized
|
Session ID. If a user has logged in and is authorized
|
||||||
he does not have to reauhorize when he revisits the
|
he does not have to reauthorize when he revisits the
|
||||||
application as the user is recognized by the Session ID.
|
application as the user is recognized by the Session ID.
|
||||||
In some applications it is possible to deliver the Session
|
In some applications it is possible to deliver the Session
|
||||||
ID in the Get-Request. Here is where the attack starts.
|
ID in the Get-Request. Here is where the attack starts.
|
||||||
</p>
|
</p>
|
||||||
<p>An attacker can send a hyperlink to a
|
<p>An attacker can send a hyperlink to a
|
||||||
victim with a choosen Session ID. This can be
|
victim with a chosen Session ID. This can be
|
||||||
done for example by a phishing mail. If the victim
|
done for example by a prepared mail which looks like an
|
||||||
clicks on the link and loggs in he is authorized by the
|
official mail from the application administrator. If the victim
|
||||||
Session ID the attacker has choosen. The attacker can visit
|
clicks on the link and logs in he is authorized by the
|
||||||
|
Session ID the attacker has chosen. The attacker can visit
|
||||||
the page with the same ID and is recognized as the victim
|
the page with the same ID and is recognized as the victim
|
||||||
and gets logged in without authorization.</p>
|
and gets logged in without authorization.</p>
|
||||||
|
|
||||||
@ -44,7 +45,7 @@ in lesson 2 and 3 you are the victim Jane.
|
|||||||
|
|
||||||
<p>
|
<p>
|
||||||
<b>Stage 1:</b><br>
|
<b>Stage 1:</b><br>
|
||||||
You have to send a phishing mail to Jane with a link containing a Session ID.
|
You have to send a prepared mail to Jane which looks like a mail from Goat Hills Financial with a link containing a Session ID.
|
||||||
The mail is already prepared. You only have to alter the link so it includes
|
The mail is already prepared. You only have to alter the link so it includes
|
||||||
a Session ID (SID). You can archive this by adding &SID=WHATEVER to
|
a Session ID (SID). You can archive this by adding &SID=WHATEVER to
|
||||||
the link. Of course can WHATEVER be replaced by any other string.
|
the link. Of course can WHATEVER be replaced by any other string.
|
||||||
@ -53,7 +54,7 @@ The link should look similar to following:<br>
|
|||||||
</p>
|
</p>
|
||||||
<div align="left"><font size="2">
|
<div align="left"><font size="2">
|
||||||
<img src='lesson_solutions/SessionFixation_files/sf_stage1.png'><br>
|
<img src='lesson_solutions/SessionFixation_files/sf_stage1.png'><br>
|
||||||
<b>Figure 1: Phishing Mail</b>
|
<b>Figure 1: Prepared Mail</b>
|
||||||
</font>
|
</font>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
@ -66,7 +67,7 @@ stage as you have only to click on the link 'Goat Hills Financial'.
|
|||||||
</p>
|
</p>
|
||||||
<div align="left"><font size="2">
|
<div align="left"><font size="2">
|
||||||
<img src='lesson_solutions/SessionFixation_files/sf_stage2.png'><br>
|
<img src='lesson_solutions/SessionFixation_files/sf_stage2.png'><br>
|
||||||
<b>Figure 2: Received Phishing Mail</b>
|
<b>Figure 2: Received Mail</b>
|
||||||
</font>
|
</font>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user