Tag: hijacking

Exploits, Vulnerabilities

Preventing Session fixation – hijacking

“Session fixation attacks attempt to exploit the vulnerability of a system which allows one person to fixate (set) another person’s session identifier (SID). Most session fixation attacks are web based, and most rely on session identifiers being accepted from URLs (query string) or POST data..” from Wiki. Let’s see some countermeasures we can take to …