You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Background: tufin is placed behind a corporate SSO portal that only allows PKI card based authentication. PKI card is not properly usable in context of the cmd.exe or linux shell.
Question is if it is possible to reuse a browser based established session in pytox. The idea I have in mind is to export the cookie from browser and extract session information to create a pytox session object.
The text was updated successfully, but these errors were encountered:
In theorie yes. If you re-send your cookie bag to the web server, it should allow the request. But in the real world you need to test it. If there is a web application firewall in front of the web server, it might does some fingerprinting on your request and detects session hijacking. As this is a OWASP top 10 attack a lot of products will prevent it.
Nevertheless, if you are careful with http headers(also order of header counts) and send the request from the same IP you might have a chance.
Background: tufin is placed behind a corporate
SSO
portal that only allowsPKI
card based authentication.PKI
card is not properly usable in context of thecmd.exe
or linux shell.Question is if it is possible to reuse a browser based established session in
pytox
. The idea I have in mind is to export the cookie from browser and extract session information to create apytox
session object.The text was updated successfully, but these errors were encountered: