TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hackers Steal Session Cookies to Bypass Multi-Factor Authentication

3 pointsby responsiblealmost 3 years ago

3 comments

neetcode22over 2 years ago
I found this blog on session management really useful: <a href="https:&#x2F;&#x2F;supertokens.com&#x2F;blog&#x2F;all-you-need-to-know-about-user-session-security" rel="nofollow">https:&#x2F;&#x2F;supertokens.com&#x2F;blog&#x2F;all-you-need-to-know-about-user...</a>
londons_explorealmost 3 years ago
There is a solution to this....<p>Cookies should always be used in conjunction with a TLS Session ID.<p>If the session ID doesn&#x27;t match, then throw away the cookies.<p>Session ID is designed to be hard to steal - in some clients, it actually uses keys from the TPM to derive the session ID - so even if someone steals the browser cookie jar, there is no way they can recreate the session ID.<p>Sadly today very few sites check the session ID
josephcsiblealmost 3 years ago
If you&#x27;re using an ATM and just put in your card and entered your PIN, and then someone walks up with a knife, makes you leave, and withdraws $1000 from your bank account, was that a bypass of the ATM&#x27;s 2FA?
评论 #32542779 未加载