[CyberSec'24] Lab07 - Student Version
[CyberSec'24] Lab07 - Student Version
Clickjacking
Hands-On 1, 2
Session
Security
Session Management
Session Management
Session Management
● Session management in web applications refers to the process of securely
handling and maintaining user sessions.
● A session is a period of interaction between a user and a web application,
typically beginning when a user logs in and ending when they log out or
their session expires due to inactivity.
● During a session, the application needs to recognize and track the user,
store their data, and manage their access to different parts of the
application.
● Effective session management is crucial for security, user experience, and
maintaining the state of a web application.
● User Authentication: After a user logs in, the session management system
keeps track of their authenticated state, allowing them to access protected
resources without repeatedly entering credentials.
● User State: Maintain state information about a user's activities. For example, in
an e-commerce site, the session management system keeps track of the items
in a user's shopping cart.
Session IDs & Cookies
● Session IDs:
o Session IDs (Session Identifiers) are unique tokens or strings generated by web applications
to identify and track user sessions. They are essential for maintaining stateful communication
between the client (user's browser) and the server.
o Session IDs are typically used to associate requests from a user with their session data stored
on the server.
● Cookies:
o Cookies are small pieces of data (usually text) that a web server sends to the user's browser,
which stores them locally.
o Cookies serve various purposes, such as session management, user tracking, and
personalization. In the context of session management, session cookies are commonly used
to store the session ID, allowing the server to recognize and maintain the user's session.
Insecure
Direct
Object
References
(IDOR)
What are insecure direct object
references (IDOR)?
● Insecure direct object references (IDOR) are a type of access control
vulnerability that arises when an application uses user-supplied
input to access objects directly.
● IDOR vulnerabilities are most commonly associated with horizontal
privilege escalation, but they can also arise in relation to vertical
privilege escalation.
● Examples:
o Direct reference to database objects (User account, products,…):