Section 19.183 Session Hijacking Flashcards

Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity

1
Q

Session Management

A

Fundamental security component in web applications that enables web applications to uniquely identify a user across a number of different actions and requests, while keeping the state of the data generated by the user and ensuring it is assigned to that user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cookie

A

Text file used to store information about a user when they visit a website

■ Cookies must be protected because they contain client information that is being
transmitted across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Session cookies

A

Non-persistent, reside in memory, and are deleted when the browser
instance is closed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Persistent Cookies

A

Cookies that are stored in the browser cache until they are deleted by the
user or pass a defined expiration date

● Cookies should be encrypted if they store confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Session Hijacking

A

A type of spoofing attack where the attacker disconnects a host then replaces it with his or her own machine, spoofing the original host’s IP address

■ Session hijacking attacks can occur through the theft or modification of cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Session Prediction Attacks

A

A type of spoofing attack where the attacker attempts to predict the session
token to hijack a session

■ A session token must be generated using a non-predictable algorithm and it must not reveal any information about the session client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cookie Poisoning

A

Modifies the contents of a cookie after it has been generated and sent by the
web service to the client’s browser so that the newly modified cookie can be used to exploit vulnerabilities in the web app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly