> -----Original Message-----
> From: Christopher Ostmo [mailto:[EMAIL PROTECTED]]
> 
> Ian Bagley pressed the little lettered thingies in this order...
> 
> > One thing which would prevent hijacks from simply guessing SIDS 
> would be to
> > add an md5 hash to the end of a url.... 
> > 
[snip]
> > 
> > Ian
> 
> This thread isn't about "guessing" a session ID, it's about "stealing" a 
> session ID.  The same asnwer applies to your response as to the 
> original question.
> 
> There was a thread about this just a few days ago, but the answer for 
> *most* applications is an astounding, "NO."  Unless you are running the 
> entire transaction through SSL, any packet sniffer on the network can 
> view, steal and use ANYTHING you send over the netowrk (including the 
> value of a session ID that is being sent as a cookie value, the username 
> and password for a telnet session, the username and password for an 
> FTP session, etc). Packet sniffers are incredibly easy to find, get and 
> use (even for "script kiddies"). If your session data is *that* 
> vital, you 
> should consider using SSL.
> 
> This is likely to be true as long as HTTP transmissions are stateless.
> 
> Christopher Ostmo

Indeed, SSL is the only way to properly protect from 'stealing' a SID, but still, the 
MD5 solution does tend to protect the integrity of the query string. The other day I 
was using a SSL connection to a web site which was passing an insurance premium from 
one page to another and guess what? yep! I could change the premium to just 1 pence! 
and it was quite happy to take me through to the credit card transaction site and 
prepere to bill me for 1p! Needless to say I didn't transact! And I won't mention the 
URL! I guess this is more like session sado-masachism than hijacking?

Ian

Reply via email to