Nature | Type | ID | Name |
---|---|---|---|
ChildOf | S | 593 | Session Hijacking |
Detect Unprotected Session Token Transfer
The attacker sniffs on the wireless network to detect unencrypted traffic that contains session tokens.
Technique |
---|
The attacker uses a network sniffer tool like ferret or hamster to monitor the wireless traffic at a WiFi hotspot while examining it for evidence of transmittal of session tokens in unencrypted or recognizably encrypted form. An attacker applies their knowledge of the manner by which session tokens are generated and transmitted by various target systems to identify the session tokens. |
Capture session token
The attacker uses sniffing tools to capture a session token from traffic.
Technique |
---|
Insert captured session token
The attacker attempts to insert a captured session token into communication with the targeted application to confirm viability for exploitation.
Technique |
---|
Session Token Exploitation
The attacker leverages the captured session token to interact with the targeted application in a malicious fashion, impersonating the victim.
Technique |
---|
Easy to use tools exist to automate this attack.
Scope | Likelihood | Impact | Note |
---|---|---|---|
ConfidentialityAccess ControlAuthorization | N/A | Gain Privileges | N/A |
Integrity | N/A | Modify Data | N/A |
Confidentiality | N/A | Read Data | N/A |
Availability | N/A | Unreliable Execution | N/A |
ID | Name |
---|---|
CWE-294 | Authentication Bypass by Capture-replay |
CWE-319 | Cleartext Transmission of Sensitive Information |
CWE-522 | Insufficiently Protected Credentials |
CWE-523 | Unprotected Transport of Credentials |
CWE-614 | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute |
Taxonomy Name | Entry ID | Entry Name |
---|