• About
  • Disclaimer
  • Privacy Policy
  • Contact
Saturday, June 14, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Computer Networking

community – Can session IDs distinguish a malicious software faking a restart?

Md Sazzad Hossain by Md Sazzad Hossain
0
community – F5 Failing SSL Handshake After “Consumer Good day”
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Closed. This query is off-topic. It isn’t presently accepting solutions.


NE is a website for to ask and supply solutions about professionally managed networks in a enterprise atmosphere. Your query falls exterior the areas our neighborhood determined are on subject. Please go to the assist middle for extra particulars. For those who disagree with this closure, please ask on Community Engineering Meta.

There have been a attainable assault found on a system (IVXV on-line voting) that relies on customers importing a malicious voting software which might pretend a failure then a restart to get the person’s credentials twice (this manner it should get the verifying QR code for the person’s selection,disguise it for a short time, then vote once more utilizing the second credentials it acquired through the faked failure)
.
My query is Can session ID monitoring detect this assault?
.
Particularly, this code they added in final Could?
https://github.com/valimised/ivxv/blob/revealed/voting/inside/sessionstatus/rpc/consumer.go#L103
.
Is the issue solved this manner?
I imply I do know this code is ready to detect a change in session ID, however will this forestall the malicious software from deceiving the person right into a second vote since it should have the identical session ID? Or a malicious software would have one other methods to beat this?

2- a second comply with up query: suppose it did detect and therefore prevented deceiving the voter right into a second vote, Can the server create one other communication channel to tell the voter that he/she is utilizing a malicious software?

Thanks

You might also like

Powering All Ethernet AI Networking

5G is Shifting Downstream to Enterprises

AWS Summit Sydney – Accelerating AI from Prospects to Manufacturing – IT Connection


Closed. This query is off-topic. It isn’t presently accepting solutions.


NE is a website for to ask and supply solutions about professionally managed networks in a enterprise atmosphere. Your query falls exterior the areas our neighborhood determined are on subject. Please go to the assist middle for extra particulars. For those who disagree with this closure, please ask on Community Engineering Meta.

There have been a attainable assault found on a system (IVXV on-line voting) that relies on customers importing a malicious voting software which might pretend a failure then a restart to get the person’s credentials twice (this manner it should get the verifying QR code for the person’s selection,disguise it for a short time, then vote once more utilizing the second credentials it acquired through the faked failure)
.
My query is Can session ID monitoring detect this assault?
.
Particularly, this code they added in final Could?
https://github.com/valimised/ivxv/blob/revealed/voting/inside/sessionstatus/rpc/consumer.go#L103
.
Is the issue solved this manner?
I imply I do know this code is ready to detect a change in session ID, however will this forestall the malicious software from deceiving the person right into a second vote since it should have the identical session ID? Or a malicious software would have one other methods to beat this?

2- a second comply with up query: suppose it did detect and therefore prevented deceiving the voter right into a second vote, Can the server create one other communication channel to tell the voter that he/she is utilizing a malicious software?

Thanks

Tags: applicationdistinguishfakingIDsMaliciousNetworkrestartSession
Previous Post

2025 IT Challenges Companies Could Encounter

Next Post

Don’t Fall for These Misconceptions!

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Powering All Ethernet AI Networking
Computer Networking

Powering All Ethernet AI Networking

by Md Sazzad Hossain
June 14, 2025
5G is Shifting Downstream to Enterprises
Computer Networking

5G is Shifting Downstream to Enterprises

by Md Sazzad Hossain
June 14, 2025
That is Extending to GreenOps – IT Connection
Computer Networking

AWS Summit Sydney – Accelerating AI from Prospects to Manufacturing – IT Connection

by Md Sazzad Hossain
June 13, 2025
Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.
Computer Networking

Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.

by Md Sazzad Hossain
June 13, 2025
The right way to use ChatGPT to put in writing code – and my prime trick for debugging what it generates
Computer Networking

The right way to use ChatGPT to put in writing code – and my prime trick for debugging what it generates

by Md Sazzad Hossain
June 12, 2025
Next Post
Don’t Fall for These Misconceptions!

Don’t Fall for These Misconceptions!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Google introduces new state-of-the-art open fashions

Google introduces new state-of-the-art open fashions

March 31, 2025
Navigating Change: The Energy of Digital Resilience to Rework Networks

Navigating Change: The Energy of Digital Resilience to Rework Networks

January 27, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets

Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets

June 14, 2025
How A lot Does Mould Elimination Value in 2025?

How A lot Does Mould Elimination Value in 2025?

June 14, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In