Help - Weak Session IDs

About

Knowledge of a session ID is often the only thing required to access a site as a specific user after they have logged in, if that session ID is able to be calculated or easily guessed, then an attacker will have an easy way to gain access to user accounts without having to brute force passwords or find other vulnerabilities such as Cross-Site Scripting.


Objective

This module uses four different ways to set the dvwaSession cookie value, the objective of each level is to work out how the ID is generated and then infer the IDs of other system users.


Low Level

The cookie value should be very obviously predictable.

Medium Level

The value looks a little more random than on low but if you collect a few you should start to see a pattern.

High Level

First work out what format the value is in and then try to work out what is being used as the input to generate the values.

Extra flags are also being added to the cookie, this does not affect the challenge but highlights extra protections that can be added to protect the cookies.

Impossible Level

The cookie value should not be predictable at this level but feel free to try.

As well as the extra flags, the cookie is being tied to the domain and the path of the challenge.

Reference: