SlideShare a Scribd company logo
Authentication and Session
Management
Bob Laskowski
IT 6873
Southern Polytechnic State
University
Authentication Defined
 Authentication – when applied to
network security we want to make
sure who the entity/data claims they
are is factual
Threats to authentication
 Hackers are always looking for ways into a
network. If they can acquire your method to
gain access they save themselves hours of
research
 Keep in mind that different accounts have
different levels of access, as well if they can
gain any foot hold into a network it gives
them an advantage when looking for more
vulnerabilities.
 Also if they use accounts already within the
system it actually helps to mask their actions
because the account they are using will
already have been granted authentication
rights to one degree or another
Why is this important?
 Authentication-based attacks factored
into about four of every five breaches
involving hacking in 2012
 After Celebrity Photo Hack, How Safe Is
the Cloud?
◦ The real question is less about how good
iCloud security is and more about how strong
(and how unique) a user's password is.
• If you can masquerade as another
person, there are no limits on how much
you can compromise the privacy and
integrity of anyone's online data
Weakness for authentication
 Most developers build their own
authentication and session management
schemes
 Authentication and session management
schemes are complex and these custom
built ones tend to have flaws
 Since there is no standard for this and
each point of development is different at
times these flaws are difficult to find
when they are not being looked for, such
as when a hacker finally does find them
Some Common Authentication
Methods
 Use of user ID’s
◦ Standard first initial.Last name, or something more
complex
 Passwords
◦ complexity, length, age, timeout, re-tries,
• Multifactor authentication
◦ something you know, have, are
 Encryption
◦ PGP, Public-Key Cryptography, SSL, S-HTTP and
S/MIME
 One Time Passwords
◦ Hardware/software tokens
 Digital Signatures
Common Authentication Method
examples:
 Use of user ID’s
◦ Common methods revolve around first initial
and last name. ex: r.smith
◦ However this could give an attacker an edge
on finding new accounts. Brute force attack
with every letter of alphabet and #.smith
◦ Possible new method to add protection.
 Use of initials and numbers ex. rs1234@spsu.edu
 Or in some cases fully different alias’s ex.
ws1289@spsu.edu can actually be
rs1234@spsu.edu
 Think in terms of being as obscure so no correlation
can be made to actual data aka. Data Obfuscation
which is used in electronic health records
Common Authentication Method
examples:
 Passwords
 We want a password to have certain complexity to
thwart dictionary and brute force attacks
 A good method for solid passwords is the Schneier
scheme
◦ WIw7,mstmsritt... = When I was seven, my sister threw my
stuffed rabbit in the toilet.
◦ Wow...doestcst = Wow, does that couch smell terrible.
◦ Ltime@go-inag~faaa! = Long time ago in a galaxy not far
away at all.
◦ uTVM,TPw55:utvm,tpwstillsecure = Until this very moment,
these passwords were still secure.
 Here we take a phrase and break it down into one word
or smaller supposed nonsensical phrase much more
difficult to crack
Common Authentication Method
examples:
 Passwords
In the next slide we see a method to
make sure the password entered is
actually valid
password validation function
What is it?
 Whenever we have data entered in a
form we want to make sure that it is valid
and not corrupted in any way. Here we
are looking at checking the password
someone enters
* Note, while I am using this method here
for my report, you should not do this, a
more secure method would be to email a
token to a person and have them enter a
password there. Having someone enter a
password and gaining access directly
Application
 Password validation ranges from
checking regular expressions, to
length and complexity. This is used as
a pre curser to defend against brute
force attacks
Common Authentication Method
examples:
 Multifactor authentication
 Something you know – password
 Have – security token
 Are – a biometric feature, finger print, eye scan
and so on
It is a combination of two or more things, thus
giving a layered defense
Typical scenarios
use of a card, or pins, VPN and use of digital
certificates, finger prints, hard or soft tokens
Common Authentication Method
examples:
 Encryption
◦ PGP – uses hashes, and compression,
along with symmetric key(one key to
encrypt/decrypt) to protect data
◦ Public-Key Cryptography – use of
asymmetric encryption( one key encrypt,
other decrypt)
◦ SSL, S-HTTP – use of certificates
◦ S/MIME – securing of email
Common Authentication Method
examples:
 One Time Passwords
◦ Use of challenges and responses for
users
◦ Only good for that session and then times
out
◦ Can be a hard or soft token, emailed or
texted password
 Users can be tricked into giving these up with
social engineering and hackers can use that
info to devise a pattern
 Possibly subjected to man in middle attacks
due to transmission methods
Common Authentication Method
examples:
 Digital Signatures
• helps to prove that data sent is from a
reliable source
• gives reassurance
• confirms message wasn’t tampered with
Common Authentication Method
examples:
 In the next slide we see an example of
hashing a password
 And we will see extra security applied
to it with a salt
 These are examples of defense in
depth, no one method or layer is
100% reliable
The One-Way Password
Hashing Algorithm
What is it?
 A hash is a method in which we take a
password in this case and apply a
mathematical algorithm, this algorithm
takes the fixed length password and
turns it into a fixed length binary value.
Application
 Hash's tend to be used as digital
signatures for software to ensure it
hasn’t been tampered with or
corrupted when downloaded. However
in this case we can use it to protect
our passwords for our users that
attempt to log into our site.
pseudo-random salt generator
What is it?
 It is random data that is applied to a
one way function then is added to the
hash of a password
Application
 Salts when combined with password
hash's help to add a new level of
difficulty in defending against
dictionary attacks
Actual Authentication Threats
 Confidence Tricks
◦ Various phishing methods
• Remote Technical Tricks
◦ Spoof, proxy exploits, sniffing, old exploits to technology
• Local Technical Tricks
◦ Software vulnerabilities, Trojans, viruses, hardware attacks
• Victim Mistakes
◦ Weak passwords, written down sensitive data, user errors
• Implementation oversights
◦ Replays, trusting bad data, sensitive data remembered in
forms
• Denial of service attacks
◦ Lock outs for authorized users
• Enrollment errors
◦ new set of credentials created
Authentication attacks
Attack types Attack description
Brute Force Allows an attacker to guess a
person's user name, password,
credit card number, or
cryptographic key by using an
automated process of trial and
error.
Insufficient Authentication Allows an attacker to access a
website that contains sensitive
content or functions without having
to properly authenticate with the
website.
Weak Password Recovery
Validation
Allows an attacker to access a
website that provides them with
the ability to illegally obtain,
change, or recover another user's
password.
Repercussions from
Authentication attacks
 Accounts can be locked out, or the
entire user database can be locked
out
 Outages can occur if there are
accounts that do batch work
 There can a loss of confidence in the
business if such an attack is
publicized
Prevention Methods
 First and foremost proper code
development
◦ Think like a hacker, look for what can go
wrong instead of waiting for it
 Have informed users
◦ Over inform on proper security procedures,
automate the mundane
• User access lattices
◦ Only access to what they need access to
• Security in layers
◦ Never assume one layer will do it all
Session management Defined
 Session Management – the practice of
overseeing a transfer of data between
two or more entities
 Session management focuses on an
already authenticated user
 This authenticated user has their
information bound to an actual session
token/ID
Threats to Session
management
 We've already authenticated properly to
a connection and we begin to do what it
is we do, work, shopping, surfing the
web, our banking…etc
 There will be a session identifier for what
you are doing, similar to a tracking
cookie if you will, this id ties you to what
you are actually doing
 In essence your leaving a sort of digital
bread crumb trail
Why is this important?
 Crack in Internet’s foundation of
trust allows HTTPS session
hijacking
◦ “Once the session cookie is decrypted, hackers
can exploit it to gain unauthorized access to the
user account the session cookie is designed to
authenticate. The process from start to finish
takes "a few minutes,“
 Yahoo session hijacking likely
culprit of Android spam
Weakness for session
management
 Most developers build their own
authentication and session management
schemes
 Authentication and session management
schemes are complex and these custom
built ones tend to have flaws
 Since there is no standard for this and
each point of development is different at
times these flaws are difficult to find
when they are not being looked for, such
as when a hacker finally does find them
Some Common Session
Management Methods
 Validate Session ID values coming from clients
◦ Have checks in place to confirm who's who
 Hard-to-Guess Cookie Values
◦ Match cookies values to session variables to complicate things
 User Authentication
◦ Good authentication always helps
 SSL Encryption
◦ Encryption always complicates things for hackers
 Use of trusted third parties
◦ Use a third party session management implementation to offset risk
 Use sufficient session Id length
◦ Same as passwords longer equals more secure
 Ensuring no patterns become evident
◦ You don’t want your patterns to be found in your session id’s thy
could be susceptible to brute force attacks
• Associate session id with ip address
◦ Extra layers of security
Common Session Management
Method in depth
 Hard-to-Guess Cookie Values
 Cookies are related to HTTP headers and allow
control over token expiration, time and other
granular features, this is why it’s the most
common method used
 The session uses the cookie to maintain the
connection, much like when you authenticate,
the cookie keeps your credentials active over
the session
 Making sure cookie values are not easily
guessable prevents a hacker from using the
values and trying to guess a new one and
establish a connection
Common Session Management
Method in depth
 SSL Encryption
 Since cookies are the most common method to
establish and maintain the connection we
should also look at a layered protection
 Making sure the cookies are sent over a secure
connection
 This will enable one to prevent a successful
man in the middle attack and gain useable data
from a cookie
Actual Session Management
threats
 Session hijacking attacks, targeted or generic
◦ Targeted goal to impersonate a specific user
◦ Generic they look for any user
 Session fixation attack
◦ Attacker hijacks a valid session
 Brute force
◦ Finding valid id’s through brute force searches
 Cross-site script attack
◦ Use of web applications to gain info
 Man-in-the-middle attack/Man-in-the-browser
attack
◦ Actively/passively gaining info from unsuspecting
people
• Prediction attacks
◦ Here a good ID is known and a next valid one is
Repercussions from Session
Management attacks
 Users can be impersonated and
damage can be masked
 Fraud and or theft can occur
dependent upon system access
 Worst case elevation of privileges
granted
 Best case comprised account is
locked out
Prevention Methods
 User of cookies
◦ Use of secure flag in header, makes them un-
sniffable, use of restrictions
• Don’t allow users to determine session ids
◦ Make sure they cant reuse old session info
• Each user should get a new identifier to your
site
• Time-out session identifiers
◦ Creates smaller window for attacker
• Allow clean log outs
◦ User logs out session invalidates on client and
server
• Use of secure channels for session cookies
◦ Encryption always hampers things for attackers
Summary
 Never assume you are hack proof
however make sure you mitigate your
risk, by prioritizing your levels correctly
 Take into consideration of what needs
to be protected the most and what the
damage will be if there was a issue
with it
 Always make sure to use security in
layers and never put all your eggs in
one basket
This article covers some of the principals
laid out earlier in my slide deck
Securing PHP User Authentication,
Login, and Sessions
http://blackbe.lt/php-secure-sessions/
We see use of hashing, linking to ip
addresses, a password validation, length,
complexity, used to make the password and
session id more difficult to discover
References and readings
 https://www.owasp.org/index.php/Session_Management_Cheat_She
et
 http://en.wikipedia.org/wiki/Session_%28computer_science%29
 http://blackbe.lt/php-secure-sessions/
 http://www.zdnet.com/hackers-favor-authentication-based-attacks-
report-shows-7000014426/
 https://www.owasp.org/index.php/Comprehensive_list_of_Threats_to
_Authentication_Procedures_and_Data
 http://searchsecurity.techtarget.com/feature/State-based-attacks-
Session-management
 https://www.owasp.org/index.php/Session_Management
 http://www.securityninja.co.uk/secure-development/session-
management/
 https://www.google.com/search?q=obstrufucation+of+data&ie=utf-
8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-
a&channel=np&source=hp#rls=org.mozilla:en-
US:official&channel=np&q=obsufucation+of+data

More Related Content

PPTX
The Quiet Rise of Account Takeover
PDF
Penetration testing web application web application (in) security
PDF
Owasp advanced mobile-application-code-review-techniques-v0.2
PDF
Web Security - Introduction v.1.3
PPTX
Owasp top 10 security threats
PPTX
Owasp2013 johannesullrich
PDF
Certificate Pinning in Mobile Applications
PDF
Axoss Web Application Penetration Testing Services
The Quiet Rise of Account Takeover
Penetration testing web application web application (in) security
Owasp advanced mobile-application-code-review-techniques-v0.2
Web Security - Introduction v.1.3
Owasp top 10 security threats
Owasp2013 johannesullrich
Certificate Pinning in Mobile Applications
Axoss Web Application Penetration Testing Services

What's hot (20)

PPTX
Mobile security services 2012
PPT
Developing Secure Applications and Defending Against Common Attacks
PDF
Auth on the web: better authentication
PPTX
Security testing
PPTX
Web application penetration testing
PDF
Web Application Security with PHP
PDF
Identiverse 2020 - Account Recovery with 2FA
PPTX
OWASP Top 10 Vulnerabilities 2017- AppTrana
PDF
Designing customer account recovery in a 2FA world
PDF
WebAuthn
PPTX
OWASP Top 10 - 2017 Top 10 web application security risks
PPTX
4 . future uni presentation
PDF
Oh, WASP! Security Essentials for Web Apps
PDF
Certificate Pinning: Not as Simple as It Sounds
PDF
2FA in 2020 and Beyond
PPT
Web security presentation
PDF
Web Security: A Primer for Developers
PPTX
Addressing the OWASP Mobile Security Threats using Xamarin
PPTX
Security hole #5 application security science or quality assurance
PPTX
2 . web app s canners
Mobile security services 2012
Developing Secure Applications and Defending Against Common Attacks
Auth on the web: better authentication
Security testing
Web application penetration testing
Web Application Security with PHP
Identiverse 2020 - Account Recovery with 2FA
OWASP Top 10 Vulnerabilities 2017- AppTrana
Designing customer account recovery in a 2FA world
WebAuthn
OWASP Top 10 - 2017 Top 10 web application security risks
4 . future uni presentation
Oh, WASP! Security Essentials for Web Apps
Certificate Pinning: Not as Simple as It Sounds
2FA in 2020 and Beyond
Web security presentation
Web Security: A Primer for Developers
Addressing the OWASP Mobile Security Threats using Xamarin
Security hole #5 application security science or quality assurance
2 . web app s canners
Ad

Viewers also liked (8)

PDF
Merb Auth
KEY
Session 5 presentation
PPT
PHP Cookies, Sessions and Authentication
PPTX
Translation session
PPTX
Authentication scheme for session password using Images and color
PPTX
Translating Course and Session Objectives
PDF
Authentication: Cookies vs JWTs and why you’re doing it wrong
PPT
Step by step lsmw tutorial
Merb Auth
Session 5 presentation
PHP Cookies, Sessions and Authentication
Translation session
Authentication scheme for session password using Images and color
Translating Course and Session Objectives
Authentication: Cookies vs JWTs and why you’re doing it wrong
Step by step lsmw tutorial
Ad

Similar to Authentication and session v4 (20)

PDF
PDF
UNIT 2 Information Security Sharad Institute
PDF
Two-factor authentication- A sample writing _Zaman
PDF
The Evolution of Authentication: Passwordless Solutions and Digital Identity ...
PPTX
Encryption by fastech
PDF
IRJET- Password Management Kit for Secure Authentication
PDF
1208 wp-two-factor-and-swivel-whitepaper
PDF
information security Lecture by cyber security
PDF
An Enhanced Security System for Web Authentication
PDF
Module 3-cyber security
PDF
Enhancing Security with LoginRadius Adaptive MFA for Broken Authentication
PDF
Securing User Access: Fixing Broken Authentication Through MFA
PDF
M-Pass: Web Authentication Protocol
PPTX
Improving Password Based Security
PDF
Ethical hacking and social engineering
DOCX
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
PPTX
TM112 Meeting10-Dangerous Data.pptx
PPTX
Best Practices to Protect Customer Data Effectively
PDF
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
PPT
Eds user authenticationuser authentication methods
UNIT 2 Information Security Sharad Institute
Two-factor authentication- A sample writing _Zaman
The Evolution of Authentication: Passwordless Solutions and Digital Identity ...
Encryption by fastech
IRJET- Password Management Kit for Secure Authentication
1208 wp-two-factor-and-swivel-whitepaper
information security Lecture by cyber security
An Enhanced Security System for Web Authentication
Module 3-cyber security
Enhancing Security with LoginRadius Adaptive MFA for Broken Authentication
Securing User Access: Fixing Broken Authentication Through MFA
M-Pass: Web Authentication Protocol
Improving Password Based Security
Ethical hacking and social engineering
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
TM112 Meeting10-Dangerous Data.pptx
Best Practices to Protect Customer Data Effectively
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Eds user authenticationuser authentication methods

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Machine learning based COVID-19 study performance prediction
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation_ Review paper, used for researhc scholars
Machine learning based COVID-19 study performance prediction
sap open course for s4hana steps from ECC to s4
MYSQL Presentation for SQL database connectivity
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Authentication and session v4

  • 1. Authentication and Session Management Bob Laskowski IT 6873 Southern Polytechnic State University
  • 2. Authentication Defined  Authentication – when applied to network security we want to make sure who the entity/data claims they are is factual
  • 3. Threats to authentication  Hackers are always looking for ways into a network. If they can acquire your method to gain access they save themselves hours of research  Keep in mind that different accounts have different levels of access, as well if they can gain any foot hold into a network it gives them an advantage when looking for more vulnerabilities.  Also if they use accounts already within the system it actually helps to mask their actions because the account they are using will already have been granted authentication rights to one degree or another
  • 4. Why is this important?  Authentication-based attacks factored into about four of every five breaches involving hacking in 2012  After Celebrity Photo Hack, How Safe Is the Cloud? ◦ The real question is less about how good iCloud security is and more about how strong (and how unique) a user's password is. • If you can masquerade as another person, there are no limits on how much you can compromise the privacy and integrity of anyone's online data
  • 5. Weakness for authentication  Most developers build their own authentication and session management schemes  Authentication and session management schemes are complex and these custom built ones tend to have flaws  Since there is no standard for this and each point of development is different at times these flaws are difficult to find when they are not being looked for, such as when a hacker finally does find them
  • 6. Some Common Authentication Methods  Use of user ID’s ◦ Standard first initial.Last name, or something more complex  Passwords ◦ complexity, length, age, timeout, re-tries, • Multifactor authentication ◦ something you know, have, are  Encryption ◦ PGP, Public-Key Cryptography, SSL, S-HTTP and S/MIME  One Time Passwords ◦ Hardware/software tokens  Digital Signatures
  • 7. Common Authentication Method examples:  Use of user ID’s ◦ Common methods revolve around first initial and last name. ex: r.smith ◦ However this could give an attacker an edge on finding new accounts. Brute force attack with every letter of alphabet and #.smith ◦ Possible new method to add protection.  Use of initials and numbers ex. rs1234@spsu.edu  Or in some cases fully different alias’s ex. ws1289@spsu.edu can actually be rs1234@spsu.edu  Think in terms of being as obscure so no correlation can be made to actual data aka. Data Obfuscation which is used in electronic health records
  • 8. Common Authentication Method examples:  Passwords  We want a password to have certain complexity to thwart dictionary and brute force attacks  A good method for solid passwords is the Schneier scheme ◦ WIw7,mstmsritt... = When I was seven, my sister threw my stuffed rabbit in the toilet. ◦ Wow...doestcst = Wow, does that couch smell terrible. ◦ Ltime@go-inag~faaa! = Long time ago in a galaxy not far away at all. ◦ uTVM,TPw55:utvm,tpwstillsecure = Until this very moment, these passwords were still secure.  Here we take a phrase and break it down into one word or smaller supposed nonsensical phrase much more difficult to crack
  • 9. Common Authentication Method examples:  Passwords In the next slide we see a method to make sure the password entered is actually valid
  • 11. What is it?  Whenever we have data entered in a form we want to make sure that it is valid and not corrupted in any way. Here we are looking at checking the password someone enters * Note, while I am using this method here for my report, you should not do this, a more secure method would be to email a token to a person and have them enter a password there. Having someone enter a password and gaining access directly
  • 12. Application  Password validation ranges from checking regular expressions, to length and complexity. This is used as a pre curser to defend against brute force attacks
  • 13. Common Authentication Method examples:  Multifactor authentication  Something you know – password  Have – security token  Are – a biometric feature, finger print, eye scan and so on It is a combination of two or more things, thus giving a layered defense Typical scenarios use of a card, or pins, VPN and use of digital certificates, finger prints, hard or soft tokens
  • 14. Common Authentication Method examples:  Encryption ◦ PGP – uses hashes, and compression, along with symmetric key(one key to encrypt/decrypt) to protect data ◦ Public-Key Cryptography – use of asymmetric encryption( one key encrypt, other decrypt) ◦ SSL, S-HTTP – use of certificates ◦ S/MIME – securing of email
  • 15. Common Authentication Method examples:  One Time Passwords ◦ Use of challenges and responses for users ◦ Only good for that session and then times out ◦ Can be a hard or soft token, emailed or texted password  Users can be tricked into giving these up with social engineering and hackers can use that info to devise a pattern  Possibly subjected to man in middle attacks due to transmission methods
  • 16. Common Authentication Method examples:  Digital Signatures • helps to prove that data sent is from a reliable source • gives reassurance • confirms message wasn’t tampered with
  • 17. Common Authentication Method examples:  In the next slide we see an example of hashing a password  And we will see extra security applied to it with a salt  These are examples of defense in depth, no one method or layer is 100% reliable
  • 19. What is it?  A hash is a method in which we take a password in this case and apply a mathematical algorithm, this algorithm takes the fixed length password and turns it into a fixed length binary value.
  • 20. Application  Hash's tend to be used as digital signatures for software to ensure it hasn’t been tampered with or corrupted when downloaded. However in this case we can use it to protect our passwords for our users that attempt to log into our site.
  • 22. What is it?  It is random data that is applied to a one way function then is added to the hash of a password
  • 23. Application  Salts when combined with password hash's help to add a new level of difficulty in defending against dictionary attacks
  • 24. Actual Authentication Threats  Confidence Tricks ◦ Various phishing methods • Remote Technical Tricks ◦ Spoof, proxy exploits, sniffing, old exploits to technology • Local Technical Tricks ◦ Software vulnerabilities, Trojans, viruses, hardware attacks • Victim Mistakes ◦ Weak passwords, written down sensitive data, user errors • Implementation oversights ◦ Replays, trusting bad data, sensitive data remembered in forms • Denial of service attacks ◦ Lock outs for authorized users • Enrollment errors ◦ new set of credentials created
  • 25. Authentication attacks Attack types Attack description Brute Force Allows an attacker to guess a person's user name, password, credit card number, or cryptographic key by using an automated process of trial and error. Insufficient Authentication Allows an attacker to access a website that contains sensitive content or functions without having to properly authenticate with the website. Weak Password Recovery Validation Allows an attacker to access a website that provides them with the ability to illegally obtain, change, or recover another user's password.
  • 26. Repercussions from Authentication attacks  Accounts can be locked out, or the entire user database can be locked out  Outages can occur if there are accounts that do batch work  There can a loss of confidence in the business if such an attack is publicized
  • 27. Prevention Methods  First and foremost proper code development ◦ Think like a hacker, look for what can go wrong instead of waiting for it  Have informed users ◦ Over inform on proper security procedures, automate the mundane • User access lattices ◦ Only access to what they need access to • Security in layers ◦ Never assume one layer will do it all
  • 28. Session management Defined  Session Management – the practice of overseeing a transfer of data between two or more entities  Session management focuses on an already authenticated user  This authenticated user has their information bound to an actual session token/ID
  • 29. Threats to Session management  We've already authenticated properly to a connection and we begin to do what it is we do, work, shopping, surfing the web, our banking…etc  There will be a session identifier for what you are doing, similar to a tracking cookie if you will, this id ties you to what you are actually doing  In essence your leaving a sort of digital bread crumb trail
  • 30. Why is this important?  Crack in Internet’s foundation of trust allows HTTPS session hijacking ◦ “Once the session cookie is decrypted, hackers can exploit it to gain unauthorized access to the user account the session cookie is designed to authenticate. The process from start to finish takes "a few minutes,“  Yahoo session hijacking likely culprit of Android spam
  • 31. Weakness for session management  Most developers build their own authentication and session management schemes  Authentication and session management schemes are complex and these custom built ones tend to have flaws  Since there is no standard for this and each point of development is different at times these flaws are difficult to find when they are not being looked for, such as when a hacker finally does find them
  • 32. Some Common Session Management Methods  Validate Session ID values coming from clients ◦ Have checks in place to confirm who's who  Hard-to-Guess Cookie Values ◦ Match cookies values to session variables to complicate things  User Authentication ◦ Good authentication always helps  SSL Encryption ◦ Encryption always complicates things for hackers  Use of trusted third parties ◦ Use a third party session management implementation to offset risk  Use sufficient session Id length ◦ Same as passwords longer equals more secure  Ensuring no patterns become evident ◦ You don’t want your patterns to be found in your session id’s thy could be susceptible to brute force attacks • Associate session id with ip address ◦ Extra layers of security
  • 33. Common Session Management Method in depth  Hard-to-Guess Cookie Values  Cookies are related to HTTP headers and allow control over token expiration, time and other granular features, this is why it’s the most common method used  The session uses the cookie to maintain the connection, much like when you authenticate, the cookie keeps your credentials active over the session  Making sure cookie values are not easily guessable prevents a hacker from using the values and trying to guess a new one and establish a connection
  • 34. Common Session Management Method in depth  SSL Encryption  Since cookies are the most common method to establish and maintain the connection we should also look at a layered protection  Making sure the cookies are sent over a secure connection  This will enable one to prevent a successful man in the middle attack and gain useable data from a cookie
  • 35. Actual Session Management threats  Session hijacking attacks, targeted or generic ◦ Targeted goal to impersonate a specific user ◦ Generic they look for any user  Session fixation attack ◦ Attacker hijacks a valid session  Brute force ◦ Finding valid id’s through brute force searches  Cross-site script attack ◦ Use of web applications to gain info  Man-in-the-middle attack/Man-in-the-browser attack ◦ Actively/passively gaining info from unsuspecting people • Prediction attacks ◦ Here a good ID is known and a next valid one is
  • 36. Repercussions from Session Management attacks  Users can be impersonated and damage can be masked  Fraud and or theft can occur dependent upon system access  Worst case elevation of privileges granted  Best case comprised account is locked out
  • 37. Prevention Methods  User of cookies ◦ Use of secure flag in header, makes them un- sniffable, use of restrictions • Don’t allow users to determine session ids ◦ Make sure they cant reuse old session info • Each user should get a new identifier to your site • Time-out session identifiers ◦ Creates smaller window for attacker • Allow clean log outs ◦ User logs out session invalidates on client and server • Use of secure channels for session cookies ◦ Encryption always hampers things for attackers
  • 38. Summary  Never assume you are hack proof however make sure you mitigate your risk, by prioritizing your levels correctly  Take into consideration of what needs to be protected the most and what the damage will be if there was a issue with it  Always make sure to use security in layers and never put all your eggs in one basket
  • 39. This article covers some of the principals laid out earlier in my slide deck Securing PHP User Authentication, Login, and Sessions http://blackbe.lt/php-secure-sessions/ We see use of hashing, linking to ip addresses, a password validation, length, complexity, used to make the password and session id more difficult to discover
  • 40. References and readings  https://www.owasp.org/index.php/Session_Management_Cheat_She et  http://en.wikipedia.org/wiki/Session_%28computer_science%29  http://blackbe.lt/php-secure-sessions/  http://www.zdnet.com/hackers-favor-authentication-based-attacks- report-shows-7000014426/  https://www.owasp.org/index.php/Comprehensive_list_of_Threats_to _Authentication_Procedures_and_Data  http://searchsecurity.techtarget.com/feature/State-based-attacks- Session-management  https://www.owasp.org/index.php/Session_Management  http://www.securityninja.co.uk/secure-development/session- management/  https://www.google.com/search?q=obstrufucation+of+data&ie=utf- 8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox- a&channel=np&source=hp#rls=org.mozilla:en- US:official&channel=np&q=obsufucation+of+data