LII:Web Application Security Guide/Session stealing
From LIMSWiki
Session stealing
An attacker who is able to obtain or guess the session ID can steal the session and abuse the privileges of the user.
To prevent this type of attack
- Set the “HttpOnly” attribute for session cookies
- Generate random session IDs with secure randomness and sufficient length
- Do not leak session IDs
Rationale
Setting the “HttpOnly” attribute on cookies prevents them from being read using JavaScript. This makes it harder to perform successful XSS attacks. Random, secure session IDs prevent the attacker from guessing a valid session ID. Ensuring that session IDs do not leak, for example in Referer information, copied links and HTML content from the site etc. makes sure that the attacker cannot obtain the session ID in this way.
Notes
The original source for this page is the associated Wikibooks article and is shared here under the CC BY-SA 3.0 license.