When a user doesn't use an application for a certain amount of time, most applications will automatically log out the user and destroy their session.
To determine how long it takes for a session to timeout, you can use Burp Intruder to issue the same request multiple times with increasing delays. This enables you to test compliance with security standards that require applications to timeout within a specified period. A longer timeout gives an attacker more time to use or guess a session token.
You can follow along with the process below using ginandjuice.shop, our deliberately vulnerable demonstration site.
To determine the session timeout:
ginandjuice.shop, the correct credentials are carlos:hunter2.
In the resource pool settings, select Delay between requests, then Increase delay in increments of ___ milliseconds. Add a delay time.
This attack may take some time. To continue the attack in the background, close the results dialog and click Continue attack in background. The attack is added to the Tasks panel on the Dashboard.