What is Session Hijacking and Example?

what is session hijacking - wholikeit.com

what is session hijacking - wholikeit.com

Session hijacking is nothing but a type of security attack on any of the user session that is running on an internet network connection. Sometimes this method of hijacking is also referred as cookie hijacking, where the hacker gains the access to the session key and performs the operation of spoofing reliably. The most common method of session hijacking includes the TCP/IP session hijacking or also known as IP spoofing. In this process, the hacker makes the use of source routed IP packets, and thus insets the commands into a node of active communication. The attackers enter into such communication network and form one of the authenticated users. As we all know that, in a TCP/IP session the authentication is the initial process of starting the communication. So, in session hijacking the attackers gain their access through the authenticating process of TCP session and thereby continue the process of spoofing. The hacker easily gains the complete access to the system and thus the sessions can be hijacked. This type of attack can either lead to crash your system or can go against the network connectivity and impel in the heavy packet loss.

There are basically two types of Session Hijacking:

Active Session Hijacking:

In an active session hijacking, an authenticated session is being hijacked. In this method, the user already remains logged into the active session of his profile or account. The hackers try to steal the network cookies and thereby hijack the active session. The original user cannot further login into his/her profile and he is disconnected from the server.

Passive Session Hijacking:

In this method of hijacking, the hacker does not attack any active session. They follow some different process to get the complete information of the login credentials of the user. When the user enters his login credentials on the system and tries to get access to his profile on the network, a hacker then steals his login credentials and hacks the user’s account and profile information.
TCP Session Hijacking:
TCP Session Hijacking is one of the earlier methods of session hijacking. A TCP session hijacking generally occurs between a server and a client machine. Unlike the SQL injection method of hacking, in this method no malicious codes are entered into the network interface. Rather than that, the hacker creates complete new sessions and injects these sessions in the application level. The hacker thereby gains the complete access to the sessions and by hijacking the original sessions from the network level, they can get the complete information of the user profile.

Example of Session Hijacking:

Basically when the process of session hijacking is carried out over a network connection, the attackers will demand your session ID and perform their task using this ID. The session ID is transferred via cookies. Thus, if the hacker gains the access of your cookies, he replaces his own cookie with yours and the session is then hijacked. By the use of XSS attacks, you can gain the access of user’s cookie information. The session hijacking can hence be carried out on the active sessions.

(Visited 336 times, 5 visits today)

Be the first to comment

Leave a Reply