Page 1496 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1496

and then uses a hijacking technique to take over the session and
               assume the identity of the authorized user. The following list includes

               some common techniques:

                    Capturing details of the authentication between a client and server
                    and using those details to assume the client’s identity

                    Tricking the client into thinking the attacker’s system is the server,
                    acting as the middleman as the client sets up a legitimate
                    connection with the server, and then disconnecting the client

                    Accessing a web application using the cookie data of a user who did

                    not properly close the connection

               All of these techniques can have disastrous results for the end user and
               must be addressed with both administrative controls (such as anti-
               replay authentication techniques) and application controls (such as
               expiring cookies within a reasonable period of time).
   1491   1492   1493   1494   1495   1496   1497   1498   1499   1500   1501