Session cookie is not randomized enough
Numerous applications use a session cookie to maintain the state of a logged in user. The use of authentication to validate the user that has logged in is very common and most testers would focus on that aspect of the security. But a malicious user will look towards the session cookie itself to see how he/she could gain authorized access to the application. The session cookie must have very good algorithm to generate the randomness of the session cookie.

Malicious black hat hackers will use tools to determine what the randomness of the session cookie is. This is very easy to do and see if there is a logical pattern to assigning session cookies. If the developer of the application does not use enough randomness to generate the session cookie, there is no need to even have authentication. A random session cookie is vital to the application, without a properly randomized session cookie, a malicious user can and will walk all over the application.

Session cookie does not expire
If a session cookie does not expire then technically it could last…. forever. This means that a malicious black hat could steal a cookie via a XSS vulnerability or another type of man in the middle attack and use that session cookie to hijack your account. Additionally if there is not enough randomness and you can predict a session cookie that does not expire, well you can imagine the problems there.

Any session cookie that is used, must have an expiration time. Typically the expiration time starts counting down as soon as the web browser has been idle. And will expire if the web browser session has been idle for too long. Additionally the session cookie should also expire after a pre-determined time. No one wants a session cookie maintained forever just because a browser session is active.

Explore More

Critical SQL Injection in Gulf Travels and Tours

PlanetCreator has reported another critical SQL Injection (vulnerability) on Gulf Tranvels and Tours : Your reliable agency in Myanmar http://www.myanmartravelsgulf.com powered by IndexMyanmar This vulnerability has been alerted to :-

System User on XP

Here is the article on the available ways to logon/scalate to SYSTEM user on XP… Enjoy Logon as “NT AUTHORITY\SYSTEM” user on Windows XP %% BY EDU %% [-Introduction-]Windows XP

Reverse SSH Tunneling (NAT)

Have you ever wanted to ssh to your Linux box that sits behind NAT? Now you can with reverse SSH tunneling. This document will show you step by step how