Session Hijacking
Session hijacking is a cyberattack in which an attacker gains unauthorized access to a user's active application or website session. The attacker does this by stealing or forging the session token that identifies an authenticated user, allowing them to impersonate that user without needing their password. This type of attack can bypass multi-factor authentication because the attacker exploits a session that has already been authenticated.
Session hijacking is the exploitation of a valid session identifier, typically a session token or cookie, to gain unauthorized access to an authenticated session between a user and an application. The attacker inserts themselves between the claimant and the verifier after a successful authentication exchange, or obtains a valid session ID through methods such as token theft, prediction, or interception, and then uses that session ID to assume the authenticated user's identity and privileges. Because the attack operates on a post-authentication session rather than on credentials directly, it can circumvent controls such as MFA that apply only at the point of authentication.
Why it matters
Session hijacking is a significant threat because it allows attackers to bypass authentication controls entirely, including multi-factor authentication. Because the attack targets a session that has already been authenticated, any credential-based defenses applied at login are rendered ineffective once a valid session token is stolen or forged. An attacker who successfully hijacks a session inherits the full privileges of the authenticated user, which may include access to sensitive data, administrative functions, or financial operations.
Who it's relevant to
Inside Session Hijacking
Common questions
Answers to the questions practitioners most commonly ask about Session Hijacking.