ssSession Jacking in Cyber Security.pptx

BarangayPawa 13 views 26 slides Mar 12, 2025
Slide 1
Slide 1 of 26
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26

About This Presentation

download


Slide Content

Session Jacking in Cyber Security

Understanding and Preventing Session Hijacking 2

What is Session Jacking? ​

Make eye contact with your audience to create a sense of intimacy and involvement Weave relatable stories into your presentation using narratives that make your message memorable and impactful Encourage questions and provide thoughtful responses to enhance audience participation Use live polls or surveys to gather audience opinions, promoting engagement and making sure the audience feel involved 4

Types of Session Jacking 5

Session Fixation : The attacker forces a victim to use a known session ID. Session Side jacking : The attacker intercepts session cookies during transmission (e.g., using packet sniffing). Cross-Site Scripting (XSS) : Attacker injects malicious scripts to steal session tokens. Man-in-the-Middle (MitM) : The attacker intercepts and modifies the communication between the victim and the server. 6

How Session Jacking Works 7

Session Establishment : User logs in, and the server creates a session with a unique ID stored as a cookie or URL parameter. Hijacking : Attacker intercepts the session ID, either by sniffing the network or exploiting vulnerabilities. Exploitation : Attacker impersonates the victim, gaining unauthorized access to sensitive data or accounts. 8

Final tips & takeaways​ Consistent rehearsal​ Practice makes perfect, so strengthen your familiarity with the presentation​ Refine delivery style​ Pacing, tone, and emphasis​ Timing and transitions​ Aim for seamless, professional delivery​ Practice audience Enlist colleagues to listen & provide feedback​ Seek feedback​ Reflect on performance​ Explore new techniques​ Set personal goals​ Iterate and adapt 9

Common Attack Vectors ​ 10

Packet Sniffing : Attacker monitors unencrypted network traffic to capture session data. Cross-Site Scripting (XSS) : Malicious scripts steal session cookies. Phishing : Victims are tricked into revealing their session credentials. Insecure Storage : Session data stored insecurely (e.g., in local storage) can be stolen.

Consequences of Session Jacking

Identity Theft : Attacker can impersonate the victim to access sensitive personal or financial data. Unauthorized Transactions : An attacker can perform actions on behalf of the victim, such as making unauthorized purchases or changing account settings. Reputation Damage : For businesses, compromised sessions can damage brand trust and customer relationships. Data Breaches : Critical data can be exposed or stolen.

Preventing Session Jacking

Use HTTPS : Always use SSL/TLS to encrypt communication between client and server. Session Expiration : Set reasonable session expiration times to limit the window for attacks. Secure Cookie Attributes : Use the Http Only, Secure, and Same Site flags for session cookies. Multi-Factor Authentication (MFA) : Adds an extra layer of protection, reducing the impact of session hijacking. Regular Session Regeneration : Periodically regenerate session IDs to prevent fixation attacks.

Detection and Mitigation

Monitor for Suspicious Activity : Look for unexpected login locations or abnormal behavior (e.g., sudden IP changes). IP & User-Agent Binding : Track the IP address and user-agent string of the session to detect mismatches. Session Logging : Log all session activity for detecting and investigating potential hijacking attempts. Behavioral Analysis : Use machine learning and AI to detect anomalies in user behavior.

Best Practices for Users

Use Strong Passwords : Ensure accounts are protected with strong, unique passwords. Be Cautious of Public Wi-Fi : Avoid using public networks for accessing sensitive accounts without a VPN. Log Out After Use : Always log out of sensitive websites and services when finished. Keep Software Updated : Ensure browsers and devices are up-to-date with the latest security patches.

Case Studies of Session Jacking Attacks

Example 1 : A major e-commerce website where attackers used session hijacking to steal user accounts and make unauthorized purchases. Example 2 : A social media platform where attackers leveraged XSS to hijack user sessions and post malicious content

Tools Used in Session Jacking

Wireshark : Used for packet sniffing to capture session data. Cain and Abel : A tool for session hijacking and other network-related attacks. Burp Suite : A security testing tool that can be used to intercept and manipulate HTTP requests, including session hijacking attempts.

Conclusion

Summary : Session Jacking is a significant cybersecurity threat, but with awareness and proper precautions, it can be mitigated. Key Takeaways : Secure session management, encryption, and vigilance can prevent session hijacking. Call to Action : Implement best practices and educate users on the dangers of session hijacking.

THANK U!!!!!!
Tags