eCPPTv2-PTP-Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝eCPPTv2 / PTP - Notes
  • 1️⃣1 - ​System Security
    • 1.1 Architecture Foundamentals
    • 1.2 Assemblers and Tools
    • 1.3 Buffer Overflow
    • 1.4 Cryptography
    • 1.5 Malware
    • 1.6 Shellcoding
  • 2️⃣2 - Network Security
    • 2.1 System/Host Based Attacks
      • 2.1.1 Windows Vulnerabilities
    • 2.2 Network Based Attacks
    • 2.3 The Metasploit Framework (MSF)
      • MSF Introduction
      • Information Gathering & Enumeration
      • Vulnerability Scanning
      • Client-Side Attacks
      • Post Exploitation
      • Armitage
    • 2.4 Exploitation
    • 2.5 - Post Expolitation / Pivoting
      • 2.5.1 Pivoting Guidelines
      • 2.5.2 Pivoting Example (3 Targets)
    • 2.6 Social Engineering
  • 3️⃣3 - PowerShell for PT
    • 3.1 PowerShell
  • 4️⃣4 - Linux Exploitation
    • 4.1 Linux Vulnerabilities
    • 4.2 Linux Exploitation
    • 4.3 Linux Post-Exploitation
    • 4.4 Linux Privilege Escalation
      • 4.4.1 Kernel Exploitation
      • 4.4.2 SUID Exploitation
      • 4.4.3 CronJobs
  • 5️⃣5 - Web App Security
    • 5.1 - Web App Concepts
      • 5.1.1 HTTP/S Protocol
      • 5.1.2 Encoding
      • 5.1.3 Same Origin
      • 5.1.4 Cookies
      • 5.1.5 Session
      • 5.1.6 Web App Proxies
    • 5.2 - Information Gathering
      • 5.2.1 Gathering Information on Your Targets
      • 5.2.2 Infrastructure
      • 5.2.3 Fingerprinting Frameworks and Applications
      • 5.2.4 Fingerprinting Custom Applications
      • 5.2.5 Enumerating Resources
      • 5.2.6 Information Disclosure Through Misconfiguration
      • 5.2.7 Google Hacking
      • 5.2.8 Shodan HQ
    • 5.3 - Cross Site Scripting
      • 5.3.1 XSS Anatomy
      • 5.3.2 Reflected XSS
      • 5.3.3 Stored XSS
      • 5.3.4 DOM-Based XSS
      • 5.3.5 Identifying & Exploiting XSS with XSSer
    • 5.4 - SQL Injection
      • 5.4.1 Introduction to SQL Injection
      • 5.4.2 Finding SQL Injection
      • 5.4.3 Exploiting In-Band SQL Injection
      • 5.4.4 Exploiting Error-Based SQL Injection
      • 5.4.5 Exploiting Blind SQL Injection
      • 5.4.6 SQLMap
      • 5.4.7 Mitigation Strategies
      • 5.4.8 From SQLi to Server Takeover
    • 5.5 - Other Common Web Attacks
      • 5.5.1 Session Attacks
      • 5.5.2 CSRF
  • 6️⃣6 - ​Wi-Fi Security
    • 6.1 Traffic Analysis
  • 7️⃣7 - ​Metasploit & Ruby
    • 7.1 Metasploit
  • 📄Report
    • How to write a PT Report
  • 🛣️RoadMap & My Experience
  • 📔eCPPT Cheat Sheet
Powered by GitBook
On this page
  • Session
  • Session vs Cookies
  • Session Mechanism
  • Session Cookies
  • Session Cookie Installation:
  1. 5 - Web App Security
  2. 5.1 - Web App Concepts

5.1.5 Session

Session

Web developers sometimes opt to store information on the server side rather than the client side. This decision is motivated by a desire to conceal application logic and to minimize the back-and-forth data transmission, a characteristic behavior of cookies. HTTP sessions provide a straightforward mechanism that enables websites to store variables specific to a given visit on the server side. Each user session is uniquely identified by either a session ID or token, assigned by the server.

Session vs Cookies

  • Storage Location:

    • Cookies are stored on the client side.

    • Session variables are stored on the server side.

  • Expiration:

    • Cookies can have a longer lifespan and persist even after the browser is closed.

    • Session variables expire with the session, usually sooner than cookies.

Session Mechanism

  • Session Token (or Session ID):

    • Assigned by the web server to the client.

    • Presented by the client in subsequent requests to be recognized.

    • Acts as a primary key to retrieve client state and associated variables on the server.

Session Cookies

  • Contain a single parameter in a key-value pair format.

  • Examples: SESSION=0wvCbOBWDH8w, PHPSESSID=13An5Z6Uo4pH, JSESSIONID=W7DPUBgw7kTM.

  • Session IDs can be stored in text files, databases, or server memory.

Session Cookie Installation:

  • Servers can install session cookies after specific client activities, like logging in or opening a page.

  • The browser includes the session cookie in subsequent requests.

  • Session cookies help maintain variables, reducing bandwidth usage.

Session Cookie Example:

  • The client uses a login form, and the server responds with a Set-Cookie header containing the session ID.

  • The browser includes the session cookie in subsequent requests.

  • Any subsequent request carries the session cookie, allowing the server to recognize the client.

Alternative:

  • Session IDs can be sent via the GET method appended to the URL.

  • Example: http://example.site/resource.php?sessid=k27qds7h1w.

Previous5.1.4 CookiesNext5.1.6 Web App Proxies

Last updated 1 year ago

5️⃣