A session cookie caught in Burp Suite
The request started on the victim and was intended for http://dojo-scavenger. The rogue A.P forwards the request to the transparent burp proxy, which copies the it and forwards it to the original destination. Burp copies the response as well, and sends it back to the victim to complete the communication.
After capturing the cookie, I can include it with future requests to the site to impersonate that user's session until it expires. A simple way to do this is with a plugin for the Firefox Web Browser that allows you to manually define cookies for a site.
Inserting a trapped cookie into a browsing session
No comments:
Post a Comment