Session Fixation Lessons Plan
git-svn-id: http://webgoat.googlecode.com/svn/trunk@313 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
parent
b638314dd1
commit
e3bc01dc52
@ -0,0 +1,32 @@
|
|||||||
|
<div align="Center">
|
||||||
|
<p><b>Lesson Plan Title:</b> Session Fixation</p>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<p><b>Concept / Topic To Teach:</b> </p>
|
||||||
|
How to steal a session with a 'Session Fixation'
|
||||||
|
<br>
|
||||||
|
<div align="Left">
|
||||||
|
<p>
|
||||||
|
<b>How the attacks works:</b>
|
||||||
|
</p>
|
||||||
|
A user is recognized by the server by an unique Session ID. If a
|
||||||
|
user has logged in and is authorized he does not have to
|
||||||
|
reauhorize when he revisits the application as the user is recognized
|
||||||
|
by the Session ID. In some applications it is possible to deliver
|
||||||
|
the Session ID in the Get-Request. Here is where the attack starts.
|
||||||
|
<br><br>
|
||||||
|
An attacker can send a hyperlink to a victim with a choosen Session ID.
|
||||||
|
This can be done for example by a phishing mail.
|
||||||
|
If the victim clicks on the link and loggs in he is authorized
|
||||||
|
by the Session ID the attacker has choosen. The attacker
|
||||||
|
can visit the page with the same ID and is recognized as the victim and
|
||||||
|
gets logged in without authorization.
|
||||||
|
</div>
|
||||||
|
<p><b>General Goal(s):</b> </p>
|
||||||
|
<!-- Start Instructions -->
|
||||||
|
This lesson has several stages. You play the attacker but also the victim.
|
||||||
|
After having done this lesson it should be understood how
|
||||||
|
a Session Fixation in general works. It should be also understood that
|
||||||
|
it is a bad idea to use the Get-Request for Session IDs.
|
||||||
|
<!-- Stop Instructions -->
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user