Partial HTTPS protected page emitting session cookie on non-https resources.
DESTINATION_DOMAIN='www.roadrunnersports.com'
DESTINATION_PORT='80'
## -A (ASCII) dump selected packet content
## -l (line-buffered) sets output to line-buffered
tcpdump -A -l dst $DESTINATION_DOMAIN and dst port $DESTINATION_PORT | \
grep '^Cookie: '
Duplicating cookie data for resource and voila.
Quick and dirty thing, until get all on HTTPS.
limits scope of cookie to
secure
channels, typically HTTPS protect's only cookies confidentiality active attacker can overwrite from insecure channel and disrupt integrity
limits scope of cookie to HTTP requests makes client to omit cookie when providing access to cookies via
non-HTTP
APIs prevents javascript from accessing them