Hijacking the Visitor Session

security-5-hijack-attack.png

After the visitor logs in, the attacker tries to take over the visitor’s session to perform tasks on the web server, such as executing financial transactions from the visitor’s bank account. There are a number of ways to perform this attack, the most straightforward being to try to guess the session ID. An attacker may also intercept traffic from an unsecured wireless network to try to steal the session ID. Usually, an attacker will not use the session at the same time as the visitor but will wait until after the visitor stops transmitting and before that server closes the session. Alternatively, the attacker could also mount a denial-of-service attack against the visitor’s computer.

How we Prevent Hijacking of the Visitor Session

We use your existing network connection for all traffic. unblu works with all security measures taken to improve connection safety, such as encryption, secure session IDs and secure proxy servers that withhold session data. In addition, we use a few precautions of our own, which help establish a high degree of security even if you do not use secure encryption for your web traffic.

We Take the Following Precautions:

  • The collaboration server terminates the co-browsing session if it detects a change in the IP address of the visitor.

  • The collaboration server uses two independent session IDs, one for the session between the server and the visitor, and one for the session between the server and the agent. If an attacker learns one ID, he or she cannot use it to guess the other.

  • The session ID is independent of the security code the visitor types to connect to the server in the case of a PIN session. If an attacker intercepts the PIN, he or she cannot use it to guess the session ID.

  • All session IDs are created using the Java Security SecureRandom class, a widely accepted way to create secure session IDs.

  • The client application does not require cookies. This means that you can use a secure proxy server that stores cookies internally and does not give them out to the client.

Can Hijacking the Visitor Session Work in a Cloud Setup?

This type of attack is blocked in a cloud setup in the same way. However, an on-premises setup allows you to introduce advanced security measures customized to your specific case, which is not possible in a cloud setup.

Compromising the Agent Session

Abusing the Agent Role

DOM Injection Attack

Eavesdropping on the Visitor Session

Guessing the PIN Code

  • deploycloud
  • deployonprem

results matching ""

    No results matching ""