An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking Attacks

2013 ◽  
Vol 22 (2) ◽  
pp. 55-67 ◽  
Author(s):  
Shellie Wedman ◽  
Annette Tetmeyer ◽  
Hossein Saiedian
2017 ◽  
Vol 10 (2) ◽  
pp. 359-363
Author(s):  
Rupal Sharma ◽  
Ravi Sheth

Today, web application security is most significant battlefield between victim, attacker and resource of web service. The owner of web applications can’t see security vulnerability in web application which develops in ASP.NET. This paper explain one algorithm which aim to identify broken authentication and session management vulnerability. The given method of this paper scan the web application files. The created scanner generator relies on studying the source character of the application limited ASP.NET files and the code be beholden files. A program develop for this motive is to bring about a report which describes vulnerabilities types by mentioning the indict name, disclose description and its location. The aim of the paper is to discover the broken authentication and session management vulnerabilities. The indicated algorithm will uphold organization and developer to repair the vulnerabilities and recover from one end to the other security.


Author(s):  
Kannan Balasubramanian

The obvious risks to a security breach are that unauthorized individuals: 1) can gain access to restricted information and 2) may be able to escalate their privileges in order to compromise the application and the entire application environment. The areas that can be compromised include user and system administration accounts. In this chapter we identify the major classes of web application vulnerabilities, gives some examples of actual vulnerabilities found in real-life web application audits, and describes some countermeasures for those vulnerabilities. The classes are: 1) authentication 2) session management 3) access control 4) input validation 5) redirects and forwards 6) injection flaws 7) unauthorized view of data 8) error handling 9) cross-site scripting 10) security misconfigurations and 10) denial of service.


2013 ◽  
Vol 734-737 ◽  
pp. 2994-2997
Author(s):  
Ping Ping Liu

Session replication is the common user demand of web application. Good session management program can enhance the user experience. At the same time it doesnt increase the burden of system operation. The paper mainly analyses on the five commonly used session management program. And it compares the topological structure, advantages and disadvantages and the difficulty level of realization of five session management program.


Author(s):  
Md. Maruf Hassan ◽  
Shamima Sultana Nipa ◽  
Marjan Akter ◽  
Rafita Haque ◽  
Fabiha Nawar Deepa ◽  
...  

Organizational web servers reflect the public image of an organization and serve web pages/information to organizational clients via web browsers using HTTP protocol. Some of the web server software may contain web applications that enable users to perform high-level tasks, such as querying a database and delivering the output through the web server to the client browser as an HTML file. Hackers always try to exploit the different vulnerabilities or flaws existing in web servers and web applications, which can pose a big threat for an organization. This chapter provides the importance of protecting web servers and applications along with the different tools used for analyzing the security of web servers and web applications. The chapter also introduces different web attacks that are carried out by an attacker either to gain illegal access to the web server data or reduce the availability of web services. The web server attacks includes denial of service (DOS) attacks, buffer overflow exploits, website defacement with sql injection (SQLi) attacks, cross site scripting (XSS) attacks, remote file inclusion (RFI) attacks, directory traversal attacks, phishing attacks, brute force attacks, source code disclosure attacks, session hijacking, parameter form tampering, man-in-the-middle (MITM) attacks, HTTP response splitting attacks, cross-site request forgery (XSRF), lightweight directory access protocol (LDAP) attacks, and hidden field manipulation attacks. The chapter explains different web server and web application testing tools and vulnerability scanners including Nikto, BurpSuite, Paros, IBM AppScan, Fortify, Accunetix, and ZAP. Finally, the chapter also discusses countermeasures to be implemented while designing any web application for any organization in order to reduce the risk.


This chapter discusses different essential ethical hacking tools developed by various researchers in detail. Tools discussed here include Netcat network analysis tool, Macof from Dsniff suit toolset for DOS attack, Yersinia for dhcp starvation attack, Dnsspoof tool for MITM attacks, Ettercap for network-based attacks, Cain and Abel, Sslstrip tool, and SEToolkit. These tools are used for carrying out DOS attack, DHCP starvation attack, DNS spoofing attack, session hijacking attacks, social engineering attacks, and many other network-based attacks. Also, the detailed steps to configure WAMP server as part of ethical hacking lab setup is also discussed in this chapter in order to simulate web application-based attacks. There are large numbers of ethical hacking tools developed by the researchers working in this domain for computer security, network security, and web server security. This chapter discusses some of the essential tools in detail.


Mutation testing is one of the oldest and unique testing techniques to perform white box testing of software applications. Code coverage becoming an increasing concern in the testing cycle of software, mutation testing technique aids in achieving higher code coverage and unearthing more number of errors at the testing site itself. The parameters like the database connectivity, session management, cookie management, are the beginning point of web application testing failures given the heterogeneity aspects associated with the development of a web application. A detailed account on list of available testing tools for performing mutation testing are presented here. A big bundle of mutation testing tools are still available, however they are not focussing on some of the crucial web vulnerabilities like session and cookie management in web apps. In the current work, a tool to perform mutation testing of web applications is developed and tested to see if desired results are occurring. An architecture of the tool is designed is discussed and presented. A brief analysis on results is presented


IJARCCE ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 1-10
Author(s):  
Israel O. Ogundele ◽  
Abigail O. Akinade ◽  
Harrison O. Alakiri

Sign in / Sign up

Export Citation Format

Share Document