Complete Process of Sessions Hijack is a cyberattack where an attacker takes over a user’s session by stealing or manipulating session identifiers (usually cookies or tokens), thereby allowing unauthorized access to web applications or user data.
Session Hijacking – What is Session Hijacking | Complete Process of Session Hijack
What is Session Hijacking?
1: Attacker Seizes Control.
2: TCP Communication Session.
3: Between 2 Computers.
4: Authentication only at the start of TCP.
5: Sniffing All the Traffic.
6: Steals Valid Session ID.
7: Authentication.
Why is Session Hijacking Successful?
1: Invalid Session ID (AC Lack).
2: Weak Session-ID Generation Algorithm.
3: Insecure Session-ID Handling.
4: Indefinite Session Timeout.
5: Most PC use TCP/IP – (Vulnerable).
6: Countermeasures do not work without encryption.
Session Hijacking Process:
1: Sniffing.
2: Monitor.
3: Session Desynchronization.
4: Session ID Prediction.
5: Command Injection.
Types of Session Hijacking:
1: Passive.
2: Active.
Session Hijacking in the OSI Model:
Network Level Hijacking:
Network-level hijacking can be defined as the interception of packets during the transmission between a client and the server in a TCP or UDP session
Application-Level Hijacking:
Application-level hijacking refers to gaining control over the HTTP user session by obtaining the session IDs