Obtain a valid token, by whatever means the application enables you to
obtain one.
■
Access the login form and perform a login using this token.
■
If the login is successful and the application does not issue a new token,
then it is vulnerable to session fixation.
If the application does not support authentication, but does allow users to
submit and then review sensitive information, you should verify whether the
same session token is used before and after the initial submission of user-spe-
cific information. If so, then an attacker can obtain a token and feed this to a
target user. When the user submits sensitive details, the attacker can use the
token to view the user’s information.
HACK STEPS
■
Do'stlaringiz bilan baham: |