annotated-aync20session20120IA8060.docx.pdf

1

Sync Session Paper 1

Modupeola Sasore

Course: IA8060

May 13, 2023

2

Explain what happens when a season is hijacked.

Session hijacking occurs when an attacker steals a user's session cookies or IDs. An

attacker can steal data, make illicit transactions, or transmit messages using session hijacking.

Man-in-the-middle, XSS, and packet sniffing can hijack sessions. A session hijacker can utilize

the hijacked account to impersonate a user, steal sensitive data, or conduct other system assaults.

(Wayne et al., 2023). Theft of sensitive information, monetary loss, damage to one's reputation,

and legal liability are just some of the potential outcomes of a session hijacking assault. The

following are some safeguards that website developers and system administrators may take to

protect their users from session hijacking attacks.

Developers should use encryption and secure protocols like HTTPS to communicate

session cookies and session IDs for secure session management. Session cookies should expire

after a short time and encourage users to re-authenticate after inactivity. Securing

Authentication: Multi-factor authentication, strong passwords, and password limits can keep

attackers out of user accounts and sessions. Regular vulnerability scans and penetration testing

are the best techniques to uncover security issues that attackers may use to take over a user's

session and repair them. Session hijacking is dangerous, thus users should be warned to avoid

strange links, use strong passwords, and log out after using their accounts.

Describe the difference between spoofing and hijacking.

Spoofing and hijacking cyberattacks put ICT infrastructure at risk. Cybercriminals launch

these assaults to steal information, breach networks illegally, or accomplish other nefarious ends.

One must “spoof” or pose as a reliable entity to obtain access to private data or systems. A phony

3

website or email account might imitate a trustworthy business. Email, IP, and DNS spoofing are

popular spoofing attacks.

Cybercriminals sometimes counterfeit emails from banks or government organizations to

deceive their targets into giving critical information or accessing dangerous URLs (Noh et al.,

2019). IP spoofing is forging network packets to have a false origin by changing the source IP

address. By manipulating the DNS resolution process, an attacker can trick a user into visiting a

malicious website. However, hijacking is when one party takes over a communication session

involving two or more participants. An adversary can do harmful acts by sabotaging

communication channels. Several types of hijacking attacks exist, including session, IP, and

clickjacking.

When an attacker engages in session hijacking, they take over a conversation between a

user and a website to get access to private data or commit other forms of mischief. By tampering

with the routing tables, an attacker can divert traffic meant for a specific IP address to his or her

machine. During a clickjacking attack, the target is tricked into clicking on a link or button that,

once clicked, performs an activity without their knowledge or agreement.

Name and describe the steps in conducting a session hijacking attack

In a session hijacking attack, a hacker takes control of a legitimate session between two

users. The hacker then poses as another user to steal information, do illegal acts, or take over the

system. Several methods exist for launching a session hijacking assault, each of which entails the

following stages.

 Passive monitoring- The first step is for the attacker to find a legitimate session to hijack

by monitoring the network traffic and the dialogue between the two parties. To

4

successfully hijack a session, an attacker must identify certain packets that include

session identifiers, login credentials, or other valuable information.

 Session ID spoofing- Second, the attacker utilizes the information from the first step to

construct a phony session by spoofing the session ID. The attacker initiates a connection

with the server by sending a request with the faked session ID.

 Session ID prediction- Here, the adversary best guesses a legitimate session's identifier

(Prapty et al., 2020). To do this, we look at how frequently specific server and client

session IDs are generated. The attacker may take over the session after correctly

anticipating the session ID.

 Session fixation- The attacker will generate a new session ID and require the victim to

utilize it if they want to employ this tactic. The attacker might email the victim a

malicious link using the session ID. After the victim clicks the link, the attacker can take

over their session.

 Man-in-the-middle attack- Here, the attacker listens to the server's and client's

conversations. The attacker then acts as a go-between for the two parties, relaying and

altering their communications to take over the session.

 Exploiting session vulnerabilities- In this method, the attacker takes control of the

session by taking advantage of flaws in the system that manages them. Examples of such

vulnerabilities exist in the authentication procedure and the encryption used for session

identifiers.

Describe different types of session hijacking.

The term “session hijacking” describes the illegal usage of another user's session on a

network. With this method, the attacker may take over the victim's account and make changes as

5

if they were the real user (Calzavara et al., 2019). Session hijacking can take several forms, like

as

 IP spoofing: The attacker forges the packets' source IP address to make them look to be

from a trusted source. The attacker can circumvent network security that using IP

addresses to authenticate users.

 Cookie hijacking: Web servers save session data in cookies. Attackers can intercept and

steal these cookies to access the user's account.

 Session fixation: An attacker in this scenario would create the user's session ID before

the user logs in. Once the user logs in, the attacker has the session ID and may take

control.

Perform sequence number prediction.

Predictive modeling in the form of sequence number prediction uses statistical methods to

foretell the next digit in a series. Finance, engineering, and computer science are just a few

disciplines that may benefit from this kind of modeling. Network protocols like TCP

(Transmission Control Protocol) and UDP (User Datagram Protocol) employ sequence number

prediction to guarantee the timely delivery of data packets in the field of information and

communication technology (ICT). Each packet in these protocols has a unique sequence number

used to verify delivery in the expected order and track down any misplaced data.

TCP relies on selective acknowledgments (SACK) to find and resend dropped packets.

Therefore, accurate sequence number prediction is crucial. The sender can avoid unnecessary

retransmissions and boost network performance by sending packets to the receiver before the

following number in the sequence (Kulmanov et al., 2020). Sequence number prediction has

6

applications outside network protocols like encryption and cybersecurity. In the world of

cryptography, for instance, sequence number prediction may be used by attackers to determine

what the following key will be. ICT professionals may utilize sequence number prediction to

boost network throughput, tighten security, and guarantee the timely arrival of data packets.

7

References

Wayne, M. L., & Sienkiewicz, M. (2023). “We Do not Aspire to Be Netflix”: Understanding

Content Acquisition Practices Among Niche Streaming Services. Television & New

Media, 24(3), 298-315.

Noh, J., Kwon, Y., Son, Y., Shin, H., Kim, D., Choi, J., & Kim, Y. (2019). Tractor beam: Safe-

hijacking of consumer drones with adaptive GPS spoofing. ACM Transactions on Privacy

and Security (TOPS), 22(2), 1–26.

Prapty, R. T., Md, S. A., Hossain, S., & Narman, H. S. (2020, April). They are preventing

session hijacking using encrypted one-time cookies. In 2020 Wireless Telecommunications

Symposium (WTS) (pp. 1-6). IEEE.

Calzavara, S., Rabitti, A., & Bugliesi, M. (2019). Sub-session hijacking on the web: Root causes

and prevention. Journal of Computer Security, 27(2), 233-257.

Kulmanov, M., & Hoehndorf, R. (2020). DeepGOPlus: improved protein function prediction

from the sequence. Bioinformatics, 36(2), 422-429.

Our customer support team is here to answer your questions. Ask us anything!