Brute-Forcing Web Application Session IDs

From: dendler@idefense.com
Date: 11/13/01


From: dendler@idefense.com
To: bugtraq@securityfocus.com, webappsec@securityfocus.com, pen-test@securityfocus.com, secpapers@securityfocus.com
Date: Tue, 13 Nov 2001 09:52:53 -0500
Subject: Brute-Forcing Web Application Session IDs
Message-ID: <3BF0ED75.4920.5548D03@localhost>

Hello,

iDEFENSE Labs has released a paper entitled "Brute-Force
Exploitation of Web Application Session IDs." It covers the basics
of brute-forcing web applications through guessing or reverse
engineering state session IDs which are often used for
authentication purposes. Several examples are shown using some
familiar web sites and applications on how stealing or mimicking a
legitimate user's credentials is possible. All relevant vendors and
site administrators were informed responsibly before publication.

The paper is available at http://www.idefense.com/sessionids.html

David Endler
Director, iDEFENSE Labs
dendler@idefense.com
www.idefense.com