wtf什么意思| 治疗白斑最有效的方法是什么| 头层牛皮除牛反绒是什么意思| 下家是什么意思| 突然全身抽搐是什么病| 长期低血糖对人体有什么危害| 输卵管堵塞有什么症状| 自身免疫性疾病是什么意思| 两肋胀满闷胀是什么病| 吃什么hcg翻倍快| 为什么癌症治不好| 大面积杀跳蚤用什么药| 红细胞减少是什么原因| 鱼水之欢是什么意思| 忍者神龟是什么意思| 琼瑶剧是什么意思| 为什么七星瓢虫是益虫| 吃什么药可以流产| 什么是妈宝男| 为什么洗澡后皮肤会痒| 吃什么排铅最快| 韩愈字什么| 存脐带血有什么用| 什么人容易得骨肿瘤| 油嘴滑舌指什么生肖| 迷瞪是什么意思| 定义是什么| 备胎是什么意思| 子宫复旧是什么意思| 什么是佛教什么是道教| luky是什么意思| 低血压有什么危害| 低钾血症吃什么药| 半夏反什么药| 排档是什么意思| 甲状腺素低吃什么能补| 十一月二十五是什么星座| 柠檬和什么不能一起吃| 脚底痛是什么原因| 墨水用什么能洗掉| 玄关是什么位置| 心病科主要看什么病| 血脂异常什么意思| 什么是荷尔蒙| 转音是什么意思| 什么叫私生饭| 黄体囊肿是什么意思| 十九畏是什么意思| 蛋白粉和乳清蛋白粉有什么区别| 藿香正气水不能和什么药一起吃| 性生活是什么意思| 三头六臂开过什么生肖| 虚伪是什么意思| 茧是什么意思| 硬膜囊前缘受压是什么意思| 什么样的教诲| 田七与三七有什么区别| 什么不已| 清水是什么意思| 前列腺炎吃什么消炎药好| 心率过快有什么危害| 才高八斗什么生肖| 紫花地丁有什么功效| 9月12日是什么星座| 知我者莫若你什么意思| 梦见摘丝瓜有什么预兆| 什么是提肛运动| 龙凤呈祥是什么意思| 手到擒来是什么意思| 脚为什么会发麻| 胎儿肠管扩张是什么原因造成的| 长命的动物是什么生肖| 五月出生是什么星座| 肾看什么科| 飞蚊症是什么原因造成的能治愈吗| 什么情况下会宫外孕| 三焦热盛是什么意思| 股骨头在什么位置| 相得益彰什么意思| 白发是什么原因引起的| 世界第一大河是什么河| 黑上衣配什么颜色裤子男| mri是什么检查| 右肋骨下方是什么器官| 惊涛骇浪什么意思| 左下腹痛挂什么科| 投递是什么意思| 额头上长斑是什么原因造成的| 小孩子上火吃什么能降火| 2021年属什么生肖| 251是什么意思| 都市丽人什么意思| 合肥为什么叫合肥| 9月19日是什么星座| 酥油是什么做的| 平肝什么意思| 戊午五行属什么| 家庭出身是什么| 肚脐上面疼是什么原因| 咂嘴是什么意思| 白骨精是什么动物| 有机物是什么| 2012属什么生肖| 谭字五行属什么| 沉香对人体有什么好处| 2020是什么生肖| 暑假是什么时候放假| 胃泌素瘤是什么意思| 膝盖疼做什么检查最好| 过午不食是什么意思| 什么是无性婚姻| 蛋白粉什么味道| 氟苯尼考兽药治什么病| 奇门遁甲是什么意思| 五行火生什么克什么| 双眸是什么意思| 长期喝什么茶能降三高| 什么程度才需要做胃镜| 小叶紫檀有什么功效| 为什么会有盆腔积液| 金利来皮带属于什么档次| 生肖马和什么生肖最配| 胃溃疡不能吃什么食物| 玉兰花什么季节开| 放化疗后吃什么恢复快| 普惠性幼儿园是什么意思| 左肾钙乳症是什么病| 木丑念什么| 日昳是什么意思| 11月什么星座| 女王是什么意思| 皮肤晒伤用什么药| 宫腔内偏强回声是什么意思| 液基薄层细胞学检查是什么| 请多指教是什么意思| 长脸适合什么耳环| 印度人口什么时候超过中国| 什么样的人容易得脑瘤| 洺字五行属什么| 有什么好| 什么是幽门螺杆菌感染| 回奶吃什么药| 青红皂白的皂是什么颜色| 亥时属什么生肖| 月柱桃花是什么意思| 温文尔雅是什么意思| 婴儿肥是什么意思| 种植什么好| 搬迁送什么礼物好| o型血的人是什么性格| 仙茅配什么壮阳效果好| hpv68阳性是什么意思| 水油是什么| 框框是什么意思| 回光返照什么意思| 美国人的祖先是什么人| 反绒皮是什么材质| 脑血栓前兆是什么症状表现| 蒂芙尼蓝是什么颜色| 屁股出汗多是什么原因| LC是什么| 回族为什么姓马的多| 水瓶男和什么座最配| 乳头刺痛什么原因| 259是什么意思| 脚软没力气是什么原因引起的| 不爱说话的人是什么性格| 做空是什么意思啊| 牛市是什么意思| 十八岁成人礼送什么礼物| 糖类抗原ca199偏高是什么原因| 什么的花瓣| 阴道炎用什么药效果好| 四月初十是什么星座| 玉势是什么| 高血脂吃什么药效果好| 胸前骨头疼是什么原因| 产后吃什么水果好| 三个土读什么| 爿是什么意思| 早泄吃什么药好| 性疾病都有什么症状| 纳呆什么意思| 鱼吃什么| 超生是什么意思| pn医学上是什么意思| 人生百味下一句是什么| 防蓝光眼镜有什么好处| 身体不适是什么意思| 梦见缝被子是什么意思| 为什么家里有蟑螂| 碳水化合物指的是什么| 血象高是什么原因| 什么病不能吃狗肉| 肌酸粉有什么作用| 胎儿肾积水是什么原因引起的| 腿毛旺盛是什么原因| 鼻子上火是什么原因引起的| 药物制剂是干什么的| 心率过快吃什么药好| 牛肉不能和什么食物一起吃| 胆固醇高吃什么最好| 身上起红点是什么病| 机械油污用什么能洗掉| 包菜是什么菜| 芥末是什么植物做的| 梦见袜子破了是什么意思| 狼毫毛笔是什么毛| ahc属于什么档次| 靖康耻指的是什么历史事件| 前列腺钙化是什么病| 落地签是什么意思| 二甲双胍缓释片什么时候吃最好| 人黄是什么| 什么是平年什么是闰年| 专科医院是什么意思| 重阳节送老人什么礼物| 老鼠屎长什么样子| 身先士卒是什么意思| 蜘蛛怕什么| 七月三号什么星座| 支原体感染吃什么药好| 等闲识得东风面什么意思| 啖是什么意思| 熬中药用什么锅好| 三高挂号挂什么科| 桃胶有什么功效| 篱笆是什么意思| 苍蝇吃什么| 文武双全是什么意思| 高反人群一般是什么人| 斑秃吃什么药效果好| 脂肪肝喝什么茶| 闺房是什么意思| 柱状上皮外移什么意思| 特诊科是什么意思| 甲磺酸倍他司汀片治什么病| 肠镜检查前需要做什么准备工作| 6月18号是什么日子| 为什么床上有蚂蚁| 胸为什么一大一小| 84年属什么生肖| 什么叫结节| 外向是什么意思| 嘴巴经常长溃疡是什么原因| 神阙穴在什么位置| 没有了晨勃是什么原因| 肚脐眼周围疼是什么原因| 终而复始什么意思| 一什么阳光填量词| 左下眼皮跳是什么原因| 依字五行属什么| 癸水是什么| 同舟共济什么意思| 男人精子少是什么原因| 常吐痰是什么原因| 吃什么可以变白| 腋下副乳有什么危害吗| 宝宝半夜咳嗽是什么原因| 阙什么意思| 痰湿中阻吃什么中成药| 低钠盐适合什么人吃| 廉价什么意思| 九月二十四号是什么星座| 百度Jump to content

China launches reform of Chinese 'green cards'

From Wikipedia, the free encyclopedia
百度 到2017年,国家开始上调燃料乙醇的进口关税,乙醇进口大幅减少,但美国依然是改性乙醇最大的进口国。

In computer science, session hijacking, sometimes also known as cookie hijacking, is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many websites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer (see HTTP cookie theft). After successfully stealing appropriate session cookies an adversary might use the Pass the Cookie technique to perform session hijacking. Cookie hijacking is commonly used against client authentication on the internet. Modern web browsers use cookie protection mechanisms to protect the web from being attacked.[1]

A popular method is using source-routed IP packets. This allows an attacker at point B on the network to participate in a conversation between A and C by encouraging the IP packets to pass through B's machine.

If source-routing is turned off, the attacker can use "blind" hijacking, whereby it guesses the responses of the two machines. Thus, the attacker can send a command, but can never see the response. However, a common command would be to set a password allowing access from elsewhere on the net.

An attacker can also be "inline" between A and C using a sniffing program to watch the conversation. This is known as a "man-in-the-middle attack".

History of HTTP

[edit]

HTTP protocol versions 0.8 and 0.9 lacked cookies and other features necessary for session hijacking. Version 0.9beta of Mosaic Netscape, released on October 13, 1994, supported cookies.

Early versions of HTTP 1.0 did have some security weaknesses relating to session hijacking, but they were difficult to exploit due to the vagaries of most early HTTP 1.0 servers and browsers. As HTTP 1.0 has been designated as a fallback for HTTP 1.1 since the early 2000s—and as HTTP 1.0 servers are all essentially HTTP 1.1 servers the session hijacking problem has evolved into a nearly permanent security risk.[2][failed verification]

The introduction of supercookies and other features with the modernized HTTP 1.1 has allowed for the hijacking problem to become an ongoing security problem. Webserver and browser state machine standardization has contributed to this ongoing security problem.

Methods

[edit]

There are four main methods used to perpetrate a session hijack. These are:

  • Session fixation, where the attacker sets a user's session ID to one known to them, for example by sending the user an email with a link that contains a particular session ID. The attacker now only has to wait until the user logs in.
  • Session side jacking, where the attacker uses packet sniffing to read network traffic between two parties to steal the session cookie. Many websites use SSL encryption for login pages to prevent attackers from seeing the password, but do not use encryption for the rest of the site once authenticated. This allows attackers that can read the network traffic to intercept all the data that is submitted to the server or web pages viewed by the client. Since this data includes the session cookie, it allows them to impersonate the victim, even if the password itself is not compromised.[3] Unsecured Wi-Fi hotspots are particularly vulnerable, as anyone sharing the network will generally be able to read most of the web traffic between other nodes and the access point.
  • Cross-site scripting, where the attacker tricks the user's computer into running code which is treated as trustworthy because it appears to belong to the server, allowing the attacker to obtain a copy of the cookie or perform other operations.
  • Malware and unwanted programs can use browser hijacking to steal a browser's cookie files without a user's knowledge, and then perform actions (like installing Android apps) without the user's knowledge.[4] An attacker with physical access can simply attempt to steal the session key by, for example, obtaining the file or memory contents of the appropriate part of either the user's computer or the server.

After successfully acquiring appropriate session cookies an adversary would inject the session cookie into their browser to impersonate the victim user on the website from which the session cookie was stolen from.[5]

Tools used by attackers

[edit]

Attackers often rely on specialized tools to execute session hijacking attacks. One such tool is Firesheep, a Firefox extension introduced in October 2010. Firesheep demonstrated session hijacking vulnerabilities in unsecured networks by capturing unencrypted cookies from popular websites, allowing users to take over active sessions of others on the same network. The tool worked by displaying potential targets in a sidebar, enabling session access without password theft.[6]

Another widely used tool is Wireshark, a network protocol analyzer that allows attackers to monitor and intercept data packets on unsecured networks. If a website does not encrypt its session cookies or authentication tokens, attackers can extract them and use them to gain unauthorized access to a victim’s account.[7]

Exploits

[edit]

Firesheep

[edit]

Firesheep, a Firefox extension introduced in October 2010, demonstrated session hijacking vulnerabilities in unsecured networks. It captured unencrypted cookies from popular websites, allowing users to take over active sessions of others on the same network. The tool worked by displaying potential targets in a sidebar, enabling session access without password theft. The websites supported included Facebook, Twitter, Flickr, Amazon, Windows Live and Google, with the ability to use scripts to add other websites.[8] Only months later, Facebook and Twitter responded by offering (and later requiring) HTTP Secure throughout.[9][10]

DroidSheep

[edit]

DroidSheep is a simple Android tool for web session hijacking (sidejacking). It listens for HTTP packets sent via a wireless (802.11) network connection and extracts the session id from these packets in order to reuse them. DroidSheep can capture sessions using the libpcap library and supports: open (unencrypted) networks, WEP encrypted networks, and WPA/WPA2 encrypted networks (PSK only). This software uses libpcap and arpspoof.[11][12] The apk was made available on Google Play but it has been taken down by Google.

CookieCadger

[edit]

CookieCadger is a graphical Java app that automates sidejacking and replay of HTTP requests, to help identify information leakage from applications that use unencrypted GET requests. It is a cross-platform open-source utility based on the Wireshark suite which can monitor wired Ethernet, insecure Wi-Fi, or load a packet capture file for offline analysis. Cookie Cadger has been used to highlight the weaknesses of youth team sharing sites such as Shutterfly (used by AYSO soccer league) and TeamSnap.[13]

CookieMonster

[edit]

CookieMonster is a man-in-the-middle exploit where a third party can gain HTTPS cookie data when the "Encrypted Sessions Only" property is not properly set. This could allow access to sites with sensitive personal or financial information. In 2008, this could affect major websites, including Gmail, Google Docs, eBay, Netflix, CapitalOne, Expedia.[14]

It is a Python based tool, developed by security researcher Mike Perry. Perry originally announced the vulnerability exploited by CookieMonster on BugTraq in 2007. A year later, he demonstrated CookieMonster as a proof of concept tool at Defcon 16.[15][16][17][18][19][20][21][22]

Prevention

[edit]

Methods to prevent session hijacking include:

  • Encryption of the data traffic passed between the parties by using SSL/TLS; in particular the session key (though ideally all traffic for the entire session[23]). This technique is widely relied-upon by web-based banks and other e-commerce services, because it completely prevents sniffing-style attacks. However, it could still be possible to perform some other kind of session hijack. In response, scientists from the Radboud University Nijmegen proposed in 2013 a way to prevent session hijacking by correlating the application session with the SSL/TLS credentials[24]
  • Use of a long random number or string as the session key. This reduces the risk that an attacker could simply guess a valid session key through trial and error or brute force attacks.
  • Regenerating the session id after a successful login. This prevents session fixation because the attacker does not know the session id of the user after they have logged in.
  • Some services make secondary checks against the identity of the user. For instance, a web server could check with each request made that the IP address of the user matched the one last used during that session. This does not prevent attacks by somebody who shares the same IP address, however, and could be frustrating for users whose IP address is liable to change during a browsing session.
  • Alternatively, some services will change the value of the cookie with each and every request. This dramatically reduces the window in which an attacker can operate and makes it easy to identify whether an attack has taken place, but can cause other technical problems (for example, two legitimate, closely timed requests from the same client can lead to a token check error on the server).
  • Users may also wish to log out of websites whenever they are finished using them.[25][26] However this will not protect against attacks such as Firesheep.

See also

[edit]

References

[edit]
  1. ^ Bugliesi, Michele; Calzavara, Stefano; Focardi, Riccardo; Khan, Wilayat (September 16, 2015). "CookiExt: Patching the browser against session hijacking attacks". Journal of Computer Security. 23 (4): 509–537. doi:10.3233/jcs-150529. hdl:10278/3663357. ISSN 1875-8924.
  2. ^ "Session Hijacking & HTTP Communication". October 19, 2020. Archived from the original on October 31, 2020.
  3. ^ "Warning of webmail wi-fi hijack". BBC News. August 3, 2007.
  4. ^ "Malware use Browser Hijacking to steal cookie". October 19, 2020.
  5. ^ Nikiforakis, Nick; Meert, Wannes; Younan, Yves; Johns, Martin; Joosen, Wouter (2011). "SessionShield: Lightweight Protection against Session Hijacking". In Erlingsson, úlfar; Wieringa, Roel; Zannone, Nicola (eds.). Engineering Secure Software and Systems. Lecture Notes in Computer Science. Vol. 6542. Berlin, Heidelberg: Springer. p. 89. doi:10.1007/978-3-642-19125-1_7. ISBN 978-3-642-19125-1.
  6. ^ "Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking > Web Authentication 101 | Cisco Press". www.ciscopress.com. Retrieved February 27, 2025.
  7. ^ "How to Hijack Sessions using Wireshark - HackBlue". hackblue.org. Retrieved February 27, 2025.
  8. ^ "Firefox extension steals Facebook, Twitter, etc. sessions". The H. October 25, 2010. Archived from the original on March 6, 2024.
  9. ^ "Facebook now SSL-encrypted throughout". The H. January 27, 2011.
  10. ^ "Twitter adds 'Always use HTTPS' option". The H. March 16, 2011.
  11. ^ "DroidSheep".
  12. ^ "DroidSheep Blog". Archived from the original on November 20, 2016. Retrieved August 7, 2012.
  13. ^ "How Shutterfly and Other Social Sites Leave Your Kids Vulnerable to Hackers". Mother Jones. May 3, 2013. Archived from the original on May 19, 2024.
  14. ^ Goodwin, Dan. "CookieMonster nabs user creds from secure sites ? The Register". www.theregister.co.uk. Retrieved February 18, 2009.
  15. ^ Perry, Mike (August 4, 2008). "CookieMonster: Cookie Hijacking | fscked.org". fscked.org. Retrieved December 18, 2018.
  16. ^ Claburn, Thomas (September 11, 2008). "CookieMonster Can Steal HTTPS Cookies -- Security -- InformationWeek". InformationWeek. Archived from the original on September 12, 2008.
  17. ^ Goodin, Dan (September 11, 2008). "CookieMonster nabs user creds from secure sites". www.theregister.co.uk. Retrieved December 18, 2018.
  18. ^ Perry, Mike (August 24, 2008). "Incomplete List of Alleged Vulnerable Sites | fscked.org". fscked.org. Retrieved December 18, 2018.
  19. ^ Prince, Brian (September 12, 2008). "HTTPS Cookie-Hijacking Tool CookieMonster Gobbles Personal Data". eWeek. Ziff-Davis. Archived from the original on October 29, 2024.
  20. ^ "Perry's Defcon Presentation (YouTube)". YouTube.
  21. ^ "Defcon Presentation slides" (PDF).
  22. ^ "CookieMonster Core Logic, Configuration, and READMEs".
  23. ^ "Schneier on Security: Firesheep". October 27, 2010. Retrieved May 29, 2011.
  24. ^ Burgers, Willem; Roel Verdult; Marko van Eekelen (2013). "Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials". Secure IT Systems. Lecture Notes in Computer Science. Vol. 8208. pp. 33–50. doi:10.1007/978-3-642-41488-6_3. ISBN 978-3-642-41487-9.
  25. ^ See "NetBadge: How To Log Out".
  26. ^ See also "Be Card Smart Online - Always log out".
孕期心情不好对胎儿有什么影响 慢阻肺吃什么药最有效 双龙戏珠是什么意思 原来是什么意思 艺字五行属什么
回声欠均匀是什么意思 蜈蚣最怕什么东西 魁罡贵人是什么意思 有什么好听的歌曲 一步两步三步四步望着天是什么歌
肺气肿有什么症状 儿童枕头用什么枕芯好 1983年出生是什么命 夏天用什么护肤品比较好 hermes是什么意思
嘴角烂了涂什么药 什么是风湿病 abo是什么 牙齿吃甜的就会疼什么原因 食指发麻是什么原因
生育能力检查挂什么科sscsqa.com ha什么意思hcv8jop5ns3r.cn 什么情况要打破伤风hcv9jop7ns0r.cn 右侧卵巢多囊样改变是什么意思hcv9jop1ns2r.cn 1月3日是什么星座hcv8jop5ns5r.cn
打嗝是什么病bfb118.com 什么是血管瘤hcv8jop0ns9r.cn 月经量少吃什么药hcv9jop2ns7r.cn 芙蓉花长什么样hcv8jop2ns2r.cn 太阳是什么颜色的hcv8jop0ns6r.cn
硬膜囊前缘受压是什么意思dayuxmw.com 什么牌空调好用又省电hcv8jop7ns2r.cn 扁桃体化脓是什么原因引起的clwhiglsz.com 打牛是什么意思hcv9jop6ns9r.cn 补铁的药什么时候吃最好hcv9jop4ns0r.cn
名称是什么意思hcv9jop1ns3r.cn 9号来的月经什么时候是排卵期hcv8jop5ns9r.cn 神经衰弱吃什么药好hcv8jop5ns7r.cn 无水奶油是什么ff14chat.com 808什么意思hcv9jop4ns4r.cn
百度