HACK STEPS
■
Log in to the application twice using the same user account, either from
different browser processes or from different computers. Determine
whether both sessions remain active concurrently. If so, the application
supports concurrent sessions, enabling an attacker who has compro-
mised another user’s credentials to make use of these without risk of
detection.
■
Log in and log out several times using the same user account, either from
different browser processes or from different computers. Determine
whether a new session token is issued each time or whether the same
Do'stlaringiz bilan baham: