Test the session termination process

The process of completing a session is mainly to check that the user of the application cannot be reused after the application user logs off. You should also check how the application manages the data stored in memory. To minimize the amount of time an attacker can attack an active session and take over it, set an expiration timeout for each session, specifying how long it will remain active. Establishing too long a session expiration time for a web application increases the risk of active session-based attacks. The shorter the session interval, the less time an attacker has to take over. Session expiration timeout values should be set according to the purpose and nature of the web application, as well as balancing security and usability so that the user can conveniently perform operations in the web application without losing the session frequently. Typical idle timeouts are 2-5 minutes for high-risk applications and 15-30 minutes for low-risk applications. The figure below shows the server response with the session cookie validity time of one year too long.

server response with too long a session cookie validity period of one year

Chcesz wiedzieć więcej?

Zapisz się i bądź informowany o nowych postach (zero spamu!).
Dodatkowo otrzymasz, moją prywatną listę 15 najbardziej przydatnych narzędzi (wraz z krótkim opisem), których używam przy testach penetracyjnych.

Nigdy nie podam, nie wymienię ani nie sprzedam Twojego adresu e-mail. W każdej chwili możesz zrezygnować z subskrypcji.

Bookmark the permalink.

Podziel się swoją opinią na temat artykułu