So I've been researching session hijacking and trying to implement security measures into my standard php-mysql user-login project.
I have a general understanding of what hijacking is and ways to make it harder, such as hashing passwords with a salt, not using GET posts, etc.
But my main question is can an attacker CREATE a session array and use it on my site? For example, with most login pages (including mine) after an email/password combo is authenticated, I set non-sensitive session variables, and all the user pages will check if the vars are set: if they are they page loads, if not , it redirects to the login.
So hijacking is using another persons session, but is it possible for an attacker to somehow create his own session if he knows the variable names i use?
Thanks.



Reply With Quote


Bookmarks