Session tokens must be generated in a way that makes them unpredictable. Predictable session tokens can expose websites to session hijacking attacks, where an attacker accesses another user's active session. If this is an authenticated session, the attacker could access the user's data and potentially perform malicious operations on behalf of the user.
You can use Burp Sequencer to collect a large number of session tokens, and analyze them for predictability.
Log in to the target site to generate an authenticated session cookie.
You can follow along with the process below using ginandjuice.shop, our deliberately vulnerable demonstration site. Use the credentials carlos:hunter2 to log in, then use the post-login response that issued your authenticated session cookie.
The Summary tab gives you an overall assessment of the randomness of the tokens. You can use the other tabs to perform a deeper analysis. For more information, see Burp Sequencer.