Stealing Web Session Cookies to Bypass MFA (Credential Access)

preview_player
Показать описание
In this video we'll be exploring how to attack, detect and defend against the theft of session cookies. A session token acts like a temporary password, meaning this technique can be used by an attacker to gain access to applications by bypassing the logon process altogether - including any multi-factor authentication steps.

If you find the video useful please do give it a like, and consider subscribing if you want more of this sort of content. Drop a note in the comments if there’s anything you think I missed, or if you have a good idea of what topic I should cover next.

Further reading/watching:

Audio Credits (licensed under CC0):

Timestamps:
0:00 Intro
1:43 Attack
3:38 Detect
6:08 Defend
Рекомендации по теме
Комментарии
Автор

Andy, Thanks a lot for making this video. The detailed explanation helped me understand more clearly. The idea of Attack, detect, defend is extraordinary. This is how we need to learn the security concepts(3D view). Please make more videos, you will soon reach good heights. All the best!!✌

pavansrivatsavakula
Автор

This video will help me test a two-factor authentication system for accessing servers and network equipment in an environment, thank you very much.

bernardesk
Автор

Thanks for the knowledge. Was looking for this explaination for a while now.

ehasaranga
Автор

Explained so well; this is some quality ass video.

Edit: subbed for sure

Nika
Автор

Great video. This helps me on MFA requirements.

ptsai
Автор

Great content.
Please do more videos in this series.

muralimohan
Автор

It would be nice if websites gave the user the ability to enable the mitigations as shown here, for instance I'd be mostly fine if I have to re-login on IP address changes. I'm a residential user, so yes my address does change, but not that often.
Actually that would be a lot less of a pain than the two factor authentication stuff being forced on me, as in their version with no options.

paulstubbs
Автор

Thanks for video, bro you are the best!!!

joelitle
Автор

I was speaking about this in theory with a more experienced hacker and they were skeptical that its possible. I told them mfa in some sites wont be sus of the new ip

DestoFlix
Автор

gud 1 Andy boy. i wonder why most web security channels are mostly by Americans.
what the heck r the other Brits doing ?
Im Indian and I need more Brit tutorials please

BlokeBritish
Автор

What if the website set a particular time for a session to end due to inactivity

impro
Автор

Hi Andy, Do we have something to store the physical address of machine? That can solve our issue as IP is a dynamic thing and can hackers can clone the IP or mac address too??

amanaggarwal
Автор

my brother, one big question I wanna ask you freely. For example in my webapp people sign up their accunt. After that from their cookie as a admin can i check beisde my webapp what other website like what other thing they are browsing from their browser? I am asking this question to see user perferense which will help us to show them their preferense ads based on their browser search history . how can I do this thing? Facebook is already being collecting our whole browsing data from cookie.

showbikshowmma
Автор

Andy, would it be secure, in this case, using a password manager + erase cookies in every session?

MrDavi
Автор

so would logging out of an account mean the session token will be different every time you log in? just clarifying cuz im a bit anxious abt one of my accounts 😭

tam
Автор

Hi, please, if we think the cookies get hacked, what we do? please, thanks

denverm
Автор

Why arnt local cookies stored encrypted?

-zerocool-
Автор

thank you soooo much i cookie logged on roblox and made 500 usd worth of

Grimzys
Автор

this help me hack my hacked account back

projectjinc.