Question: Explain Session Hijacking
1

Mumbai University > Information Technology > Sem6 > System and Web Security

Marks: 5M

Year: Dec 2015

ADD COMMENTlink
modified 2.5 years ago by gravatar for shindeankita111 shindeankita1110 written 3.4 years ago by gravatar for Ramnath Ramnath3.8k
1

Session Hijacking

  • Session hijacking can be done at two levels:
  1. Network Level

  2. Application Level.

  • Network layer hijacking involves TCP and UDP sessions.
  • Application level session hijack occurs with HTTP sessions.
  • Successful attack on network level sessions will provide the attacker some critical information which will then be used to attack application level sessions. So most of the time they occur together depending on the system that is attacked.
  • Network level attacks are most attractive to an attacker because they do not have to be customized on web application basis; they simply attack the data flow of the protocol, which is common for all web applications.

Network Level

1.TCP session Hijacking

  • TCP hijacks are meant to intercept the already established
  • TCP sessions between any two communicating parties and then pretending to be one of them, finally redirecting the TCP traffic to it by injecting spoofed IP packets so that your commands are processed on behalf of the authenticated host of the session.
  • It desynchronizes the session between the actual communicating parties and by intruding itself in between.
  • As authentication is only required at the time of establishing connection , an already established connection can be easily stolen without going through any sort of authentication or security measures concerned.
  • TCP session hijacks can be implemented in two different ways:
  1. Middle Man Attack
  2. Blind attack.
  3. IP Spoofing

IP Spoofing

  • Spoofing is pretending to be someone else.
  • This is a technique used to gain unauthorized access to the computer with an IP address of a trusted host.
  • The trusted host in case of session hijacking is the client with whose IP address we will spoof our packets so that our packets will become acceptable to the server maintaining the session with the client.
  • In implementing this technique session hijacker has to obtain the IP address of the client and inject his own packets spoofed with the IP address of client into the TCP session, so as to fool the server that it is communicating with the victim i.e. the original host.
  • What remains untouched is how to alter the sequence and the acknowledgement numbers of the spoofed packets which the server is expecting from the client.
  • Once it is altered, hijacker injects its own forged packet in the established session before the client can respond , ultimately desynchronizing the original session , because now our server will expect a different sequence number , so the original packet will be trashed.
  • Based on the anticipation of sequence numbers there are two types of TCP hijacking: Man in the Middle and Blind hijacking.

Man in the Middle attack

  • This technique involves using a packet sniffer to intercept the communication between client and the server.
  • Packet sniffer comes in two categories: Active and Passive sniffers.
  • Passive sniffers monitors and sniffs packet from a network having same collision domain i.e. network with a hub, as all packets are broadcasted on each port of hub.
  • Active sniffers works with Switched LAN network by ARP spoofing Once the hijacker reads the TCP header, he can know the sequence number expected by the server , the acknowledgement number, the ports and the protocol numbers ; so that hijacker can forge the packet and send it to the server before the client does so.
  • Another way of doing so is to change the default gateway of the client’s machine so that it will route its packets via the hijacker’s machine.
  • This can be done by ARP spoofing (i.e. by sending malicious ARP packets mapping its MAC address to the default gateways address so as to update the ARP cache on the client , to redirect the traffic to hijacker)

Blind Attack

  • If you are not able to sniff the packets and guess the correct sequence number expected by server, you have to implement “Blind Session Hijacking”.
  • You have to brute force 4 billion combinations of sequence number which will be an unreliable task.

enter image description here

2. UDP Session Hijacking

  • Since UDP does not use packet sequencing and synchronizing; it is easier than TCP to hijack UDP session.
  • The hijacker has simply to forge a server reply to a client UDP request before the server can respond.
  • If sniffing is used than it will be easier to control the traffic generating from the side of the server and thus restricting server’s reply to the client in the first place.

enter image description here

Hijacking Application Levels

  • At this level a hijacker can not only hijack already existing sessions but can also create new sessions from the stolen data.

HTTP Session Hijack Hijacking

  • HTTP sessions involve obtaining Session ID’s for the sessions, which is the only unique identifier of the HTTP session. Session ID’s can be found at three places

    1. In the URL received by the browser for the HTTP GET request.
    2. with cookies which will be stored in client’s computer.
    3. within the form fields.

Obtaining Session ID’s

  • One way to obtain the Session ID is by sniffing, which is same as the Man in middle attack. Cookies and URL’s can be sniffed from the packets and if unencrypted can provide critical user logon information.
  • Another way is by Brute Forcing the Session ID’s which involves trying a set of session id’s based on some pattern. Brute forcing is a time consuming task but worked on some algorithm can produce results rather quickly
ADD COMMENTlink
written 3.4 years ago by gravatar for Ramnath Ramnath3.8k
0

Easily understand and very well explain nice

ADD COMMENTlink
written 2.5 years ago by gravatar for shindeankita111 shindeankita1110

Goood very nice Easily understand every concept

ADD REPLYlink
written 2.5 years ago by gravatar for shindeankita111 shindeankita1110
Please log in to add an answer.