Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 14
Time To Create to Time to Use
Attack requirement:
1. The application gives the ability
for user to extend or preserve
session for long in a high changing
environment.
Attack process:
1. Normally login before the denial
period and extends the session
time out using the given option.
2. After the denial period the user is
still able to execute most of the
denied activities.
Create legitimate
session
Invalidate
credentials
without
invalidating the
session
Use the
application with
privileged role
Session Validity
Time
2017-05-10
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 14