Replay Attacks

Feb 23, 2025

Network Security: Replay Attacks and Session Hijacking

Key Concepts

  • Network Traffic Flow:

    • Information exchange between client and server.
    • Potential for interception by attackers.
  • Replay Attack:

    • Definition: Reuse of captured network information to gain unauthorized access.
    • Requirements for Attackers:
      • Access to information that can be replayed.
      • Methods to capture data include:
        • Physical network tap.
        • ARP poisoning to redirect traffic.
        • Installing malware on victim's system.
    • Process:
      • Attacker gathers details.
      • Replays the information to the server, posing as the victim.
    • Pass the Hash Attack:
      • Involves capturing username and hashed password.
      • Replaying captured credentials to authenticate as the victim.

Prevention of Replay Attacks

  • Encryption:
    • Encrypt all network traffic to prevent visibility of sensitive information.
  • Salting Passwords:
    • Use different salt for every authentication process.
    • Configure server to reject repeated hashes.

Browser Cookies and Session Hijacking

  • Cookies:

    • Store information about visited sites.
    • Could be a privacy risk.
    • Session ID: Valuable for attackers to access servers without credentials.
  • Session Hijacking (Sidejacking):

    • Process:
      • Attacker gains access to session ID.
      • Uses session ID for unauthorized sessions.
    • Packet Capture Tools:
      • Wireshark, Kismet.
    • Exploits:
      • Cross-site scripting.
      • Tools like Tamper, FireSheep, Scapy.

Prevention of Session Hijacking

  • Encryption:
    • Encrypt data end-to-end or from device to a VPN concentrator.
    • Use HTTPS to secure connections.
    • Browser extensions for enforcing HTTPS connections.

Conclusion

  • Ensuring robust network security involves encryption, proper configuration of servers, and awareness of potential vulnerabilities in network communication protocols.