信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 21-27.doi: 10.3969/j.issn.1671-1122.2014.08.004
• Orginal Article • Previous Articles Next Articles
XU Guo-tian
Received:
Online:
Abstract: Session certification is a common identity recognition mechanism of dynamic website. Most websites use this mechanism to prevent unauthorized access. If the user is not authenticated, then browse to a restricted access page, the site can't read legitimate session_id from the HTTP packet, illegal visitors will be redirected to the login page. Hacker use Session attack to capture the victim's session id, and login to the site by this value. Finally, he can get the victim's identity. If victim is an administrator, then hacker can modify the website data, even plant Trojan, leading to greater harm. It is a serious threat to the security of information network. The research of session attack and investigation method is important to forensic. The key to the successful implementation of session attack is to obtain session_id of legitimate users. Research group found no relevant research results about clue survey area of session spoofing attack.In this paper, three methods to capture session_id are studied such as switch MAC address table "aging" phenomenon, MAC-PORT attack and XSS attack. Investigation method of session attack is also studied.
Key words: session, MAC-PORT, Referer, HOST
CLC Number:
TP309
XU Guo-tian. The Research of Session Attack and Investigation Method[J]. 信息网络安全, 2014, 14(8): 21-27.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2014.08.004
http://netinfo-security.org/EN/Y2014/V14/I8/21