SYSTEMS AND METHODS FOR DETERMINING VULNERABILITY TO SESSION STEALING
First Claim
1. A method comprising:
- intercepting, at a first computing device, an intercepted packet sent from a client to a second computing device different than the first computing device, the intercepted packet including a first instruction in a first portion of the intercepted packet;
determining, using a template, a second portion of the intercepted packet that is a value that is changed by a calculated amount each time that the client sends a packet;
changing the value by the calculated amount to determine a next value for a next packet;
replacing the second portion of the intercepted packet with the next value to generate a modified packet;
replacing the first portion of the modified packet with a second instruction; and
transmitting the modified packet to the second computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for determining vulnerability to session stealing are disclosed. An example method includes intercepting, at a first computing device, an intercepted packet sent from a client to a second computing device different than the first computing device, the intercepted packet including a first instruction in a first portion of the intercepted packet, determining, using a template, a second portion of the intercepted packet that is a value that is changed by a calculated amount each time that the client sends a packet, changing the value by the calculated amount to determine a next value for a next packet, replacing the second portion of the intercepted packet with the next value to generate a modified packet, replacing the first portion of the modified packet with a second instruction, and transmitting the modified packet to the second computing device.
54 Citations
34 Claims
-
1. A method comprising:
-
intercepting, at a first computing device, an intercepted packet sent from a client to a second computing device different than the first computing device, the intercepted packet including a first instruction in a first portion of the intercepted packet; determining, using a template, a second portion of the intercepted packet that is a value that is changed by a calculated amount each time that the client sends a packet; changing the value by the calculated amount to determine a next value for a next packet; replacing the second portion of the intercepted packet with the next value to generate a modified packet; replacing the first portion of the modified packet with a second instruction; and transmitting the modified packet to the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A tangible computer readable storage medium storing instructions that, when executed, cause a machine to at least:
-
intercept, at a first computing device, an intercepted packet sent from a client to a second computing device different than the first computing device, the intercepted packet including a first instruction in a first portion of the intercepted packet; determine, using a template, a second portion of the intercepted packet that is a value that is changed by a calculated amount each time that the client sends a packet; change the value by the calculated amount to determine a next value for a next packet; replace the second portion of the intercepted packet with the next value to generate a modified packet; replace the first portion of the modified packet with a second instruction; and transmit the modified packet to the second computing device. - View Dependent Claims (18, 19)
-
-
20-32. -32. (canceled)
-
33. An apparatus comprising:
-
a session tracking module to intercept, at a first computing device, an intercepted packet sent from a client to a second computing device different than the first computing device, the intercepted packet including a first instruction in a first portion of the intercepted packet and to determine, using a template, a second portion of the intercepted packet that is a value that is changed by a calculated amount each time that the client sends a packet; a data modification module to change the value by the calculated amount to determine a next value for a next packet and to replace the second portion of the intercepted packet with the next value to generate a modified packet, and to replace the first portion of the modified packet with a second instruction; and a finalization module to transmit the modified packet to the second computing device.
-
-
34-63. -63. (canceled)
Specification