What is Session Hijacking?
Session hijacking is an attack that consists of exploiting the web applications users' session control in order to impersonate other users who are using the application.
Session hijacking is an attack that consists of exploiting the web applications users' session control in order to impersonate other users who are using the application.
The vulnerability is caused by one or more issues affecting the Session token, which represents the user’s session itself.
An attacker could predict it, due to a weak session token generation mechanism, or obtain it by stealing it.
The following list contains a few examples of how a session token could be compromised:
The session hijacking attack is dangerous due to the fact it lets a malicious actor impersonate other valid users who are authenticated to the application. In any case, this sort of attack is not a kind of phishing technique, but it could be used in phishing payloads to obtain session tokens in a very effective way.
Preventing web sessions (and users) from being hijacked is not as simple as applying a hotfix or patching a system.
The process requires a few steps and tips to be applied:
This refresh action should happen after that the user authenticates.
If you like this blog post, find more content in our Glossary.