How is a session ID assigned and used?
What is a session ID?
TLDR: They provide a way to identify and authenticate users across multiple interactions without requiring continuous re-authentication.
Why are session IDs important?
How are session IDs generated?
Where are session IDs used?
-VPNs and remote access services: VPNs and remote access services also use session IDs to manage authenticated sessions, ensuring users maintain access to the VPN or remote system without needing constant re-authentication. The session ID in these cases helps manage the encrypted connection and permissions while the user is logged in.
What is session hijacking?
Session hijacking is when an attacker steals a session ID and impersonates a user or takes over their active session.
What are some ways in which session IDs are vulnerable to theft?
What is a cookie?
A cookie is a small text file that a website saves on your computer or device to store information about your visit. Cookies help websites remember you, your preferences, and your activities. They’re essential for things like keeping you logged in, remembering items in your shopping cart, and personalizing your browsing experience.
What is rate limiting?
Rate limiting is a control mechanism used by websites, APIs and servers to limit the number of requests a user or system can make within a specific time frame, which helps prevent abuse, overload and DDoS attacks.
What is the difference between a cookie and a session ID?
A cookie is the storage mechanism that holds data. Cookies can store various types of information, including session IDs, login data, preferences, and tracking information.
A session ID is a unique identifier that’s often stored inside a cookie to manage a user’s session. The session ID itself isn’t a file—it’s simply a piece of data that helps the server identify your current session.
What are some features of session IDs that make session hijacking successful?
List the sequence of steps in the session hijacking process
What is passive vs. active session hijacking?
Passive: not modifying traffic, just recording it
Active: modifying traffic.
What is network vs. application based session hijacking?
Network level: taking over TCP sockets and sequence numbers
Application level: gaining control over user session by obtaining session ID