信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 21-27.doi: 10.3969/j.issn.1671-1122.2014.08.004

• Orginal Article • Previous Articles     Next Articles

The Research of Session Attack and Investigation Method

XU Guo-tian   

  1. China Criminal Police College, Shenyang Liaoning 110854, China
  • Received:2014-05-21 Online:2014-08-01

Abstract: Session certification is a common identity recognition mechanism of dynamic website. Most websites use this mechanism to prevent unauthorized access. If the user is not authenticated, then browse to a restricted access page, the site can't read legitimate session_id from the HTTP packet, illegal visitors will be redirected to the login page. Hacker use Session attack to capture the victim's session id, and login to the site by this value. Finally, he can get the victim's identity. If victim is an administrator, then hacker can modify the website data, even plant Trojan, leading to greater harm. It is a serious threat to the security of information network. The research of session attack and investigation method is important to forensic. The key to the successful implementation of session attack is to obtain session_id of legitimate users. Research group found no relevant research results about clue survey area of session spoofing attack.In this paper, three methods to capture session_id are studied such as switch MAC address table "aging" phenomenon, MAC-PORT attack and XSS attack. Investigation method of session attack is also studied.

Key words: session, MAC-PORT, Referer, HOST

CLC Number: