Ethical Hacking and Penetration Testing Guide


Sniffing Session Cookies with Wireshark



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə99/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   95   96   97   98   99   100   101   102   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Sniffing Session Cookies with Wireshark
Our next goal is to capture the session cookies of the victim so we can hijack his/her session. Every 
site has its own session cookie that it uses to authenticate a user. For demonstration purposes, I will 
capture the session cookies of Facebook, which are 
c _ user
and 
xs
.
Note
: If the victim has logged out of his/her Facebook account, you will not be able to use the 
session cookies, since session cookies expire upon logging out.
I have already walked you through the process of how to start a packet capture inside 
Wireshark, so I won’t do it again. What we will do inside Wireshark is that we apply a filter to 
filter out all the HTTP cookies containing the word “
c _ user
” or “
xs
”, since they are the ses-
sion cookies. If you can’t find them, I would suggest that you use http.cookie and then manually 
check for the cookies.


156
◾ 
Ethical Hacking and Penetration Testing Guide
So we have filtered all the HTTP requests containing the cookies named “
c _ user
.” Let’s 
try to inspect the first request. On inspecting the HTTP request, we find all the cookies associated 
with Facebook.
To get a clear view of all the cookies, we will right-click on the cookie field and then to 
Copy 

Bytes 

Copy printable text only. Now, all the cookies will be selected. We will delete 
the other cookies and will save only the authentication cookies.
Hijacking the Session
Now that we have the authentication cookies of the victim, we would need to inject these cookies 
in our browser to hijack the session. Personally, I prefer the “Cookie Manager” plug-in inside of 
Firefox. It’s very simple to use.
Step 1
—To inject our cookies, we will browse facebook.com, and from our tools menu, will 
select the “Cookie manager” plug-in.
Step 2
—Once the plug-in is launched, we would need to inject our cookies. We will click on 
the “Add” button at the bottom and will add both of our cookies. Here is an example.


Network Sniffing
◾ 
157
Step 3
—Once both of our cookies are injected, we will just refresh the page, and we will be 
logged in to our victim’s account.

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   95   96   97   98   99   100   101   102   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin