From the course: CISSP Cert Prep (2021): 8 Software Development Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Session hijacking

Session hijacking

From the course: CISSP Cert Prep (2021): 8 Software Development Security

Start my 1-month free trial

Session hijacking

- [Narrator] Cookies are often used for web application authentication. After a user logs into a system, the web server provides a cookie so that the user doesn't need to continuously log into the system every time they request a new webpage. Presenting the cookie with each request causes the web server to reference the earlier successful login. One major flaw on some web applications is that they don't use random cookies. Instead, they use a guessable value. Let's go ahead and take a look at an example. Once again, we'll turn to the WebGoat application security demonstration tool and the ZAP web proxy. This time we're using a simple web application that asks for username and a password and has a login button. I have two accounts that I know exist on this server and I'm going to go ahead and start the ZAP application proxy and tell it to intercept the login request. I go back to the application the first time I'll log on…

Contents