JSON Web Token Penetration Testing on Cookie Storage with CSRF Techniques

I. Darmawan, Aditya Pratama Abdul Karim, A. Rahmatulloh, R. Gunawan, Dita Pramesti
{"title":"JSON Web Token Penetration Testing on Cookie Storage with CSRF Techniques","authors":"I. Darmawan, Aditya Pratama Abdul Karim, A. Rahmatulloh, R. Gunawan, Dita Pramesti","doi":"10.1109/ICADEIS52521.2021.9701965","DOIUrl":null,"url":null,"abstract":"An authentication process is an act of proving the identity of a user when entering a system. Token-based authentication is a type of authentication that is stateless. This means that when the authentication process is carried out, there is absolutely no information about the user because the use of tokens in every request is made from the client to the server. Java Script Object Notation (JSON) Web Token is an authentication technique that provides an open and secure way to represent claims between two parties, cryptographically signed, which is designed not to be forged. However, this needs to be proven safe and not vulnerable. The purpose of this study is to conduct penetration testing of the security of JSON Web Token (JWT) storage on cookie storage using CSRF techniques. Scenarios for performing the CSRF technique were prepared in the experiment. The system architecture and tools to be used are prepared before the experiment is carried out. The experimental results in this study show that the part of the cookie attribute that embeds the flag “set-httponly: false”, can be accessed by javascript on the client-side (read and write). The CSRF technique that was tried in the research has succeeded in utilizing JWT tokens stored in cookies to send faked requests. Eventually, the victim’s account was used, and the resource was taken over.","PeriodicalId":422702,"journal":{"name":"2021 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICADEIS52521.2021.9701965","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

An authentication process is an act of proving the identity of a user when entering a system. Token-based authentication is a type of authentication that is stateless. This means that when the authentication process is carried out, there is absolutely no information about the user because the use of tokens in every request is made from the client to the server. Java Script Object Notation (JSON) Web Token is an authentication technique that provides an open and secure way to represent claims between two parties, cryptographically signed, which is designed not to be forged. However, this needs to be proven safe and not vulnerable. The purpose of this study is to conduct penetration testing of the security of JSON Web Token (JWT) storage on cookie storage using CSRF techniques. Scenarios for performing the CSRF technique were prepared in the experiment. The system architecture and tools to be used are prepared before the experiment is carried out. The experimental results in this study show that the part of the cookie attribute that embeds the flag “set-httponly: false”, can be accessed by javascript on the client-side (read and write). The CSRF technique that was tried in the research has succeeded in utilizing JWT tokens stored in cookies to send faked requests. Eventually, the victim’s account was used, and the resource was taken over.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用CSRF技术对Cookie存储进行JSON Web令牌渗透测试
身份验证过程是在进入系统时证明用户身份的行为。基于令牌的身份验证是一种无状态的身份验证。这意味着在执行身份验证过程时,绝对没有关于用户的信息,因为在每个请求中使用令牌是从客户机到服务器的。javascript对象表示法(JSON) Web令牌是一种身份验证技术,它提供了一种开放和安全的方式来表示双方之间的声明,加密签名,旨在防止伪造。然而,这需要被证明是安全的,而不是脆弱的。本研究的目的是使用CSRF技术对JSON Web令牌(JWT)存储在cookie存储上的安全性进行渗透测试。在实验中准备了实施CSRF技术的场景。在实验开始前,准备好系统架构和使用的工具。本研究的实验结果表明,cookie属性中嵌入“set-httponly: false”标志的部分,可以被javascript在客户端(读取和写入)访问。在研究中尝试的CSRF技术已经成功地利用存储在cookie中的JWT令牌发送伪造请求。最终,受害者的账户被使用了,资源被接管了。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Drug Review-based Diabetes Prediction by Using Naïve Bayes Method Scrum Best Practices Recommendation: a Media and Community Startup Case Study Sniffing Prevention in LoRa Network Using Combination of Advanced Encryption Standard (AES) and Message Authentication Code (MAC) Challenges in the implementation of E-Learning in Afghanistan Higher Education Implementation of the Spiral Optimization Algorithm in the Support Vector Machine (SVM) Classification Method (Case Study: Diabetes Prediction)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1