First, ensure that Burp is correctly configured with your browser. With intercept turned off in the Proxy "Intercept" tab, visit the login page of the application you are testing in your browser. In the Proxy "Intercept" tab, ensure "Intercept is on". The request will be captured by Burp, it can be viewed in the Proxy "Intercept" tab.
Did you enjoy this post?
Security on websites is based on session management. When a user connects to a secure website, they present credentials that testify to their identity, usually in the form of a username and password. In essence, session management ensures that the client currently connected is the same person who originally logged in. Unfortunately however, sessions are an obvious target for a malicious user, because they may be able to get access to a web server without needing to authenticate.
1. Sniffing into Active Session:
The first step in the session hijack attack is locating a target user. Attackers look for two things prior to their attack- first, they look for networks that have a high level of utilization; high volume networks help attackers to remain anonymous and they also provide a healthy supply of users to choose from, which also helps the attack. Secondly, users who use insecure network protocols such as Telnet, rlogin remote login , and FTP file transfer protocol are easy targets due to their inherently insecure design. Packet sniffing software can be used to sniff network traffic for the purpose of locating vulnerable protocols like FTP, Telnet, and rlogin. Port scanning software can also be used to identify servers that have FTP, Telnet, or rlogin ports open. The attacker then finds an active session between the target and another machine and places himself between them. Using a sniffer like Wireshark, he captures the traffic and tries to gather information about the session. He then monitors the traffic for vulnerable protocols like HTTP, telnet, rlogin, etc.
Hack sessions are an informal style of meeting that originated within the CommOps team. In hack sessions, members work on various tickets or issues that are happening in the team. They're a great way to keep on top of ongoing work and get questions answered quickly by other members of the team. It's also a great way to get to know the team a little more. They normally have a rough agenda prepared ahead of time. Sometimes it can be tickets from that week's meeting, or other times, it might be major tasks or issues that were mentioned or discussed on the mailing list or IRC. CommOps usually prepares the agenda in this Etherpad. Throughout the session, we'll work through these items, communicate on topics we need help on, and update our progress on the Etherpad. The hack sessions are usually structured by some organizational discussion in the beginning.