Learn how to use PuttyHijack to take over SSH sessions, and achieve real-time monitoring.
- Secure Shell, or SSH, is a common protocol…used by system administrators…to remotely manage enterprise servers,…and is preferred over telnet,…as it establishes a secure connection.…One of the most popular Windows tools used for SSH is PuTTY,…available from the website shown here, and when connected,…provides a terminal session on a target system.…In 2008,…Insomnia, a penetration testing company in New Zealand,…created a tool to hijack PuTTY sessions,…and in doing so, demonstrated a powerful way for testers…to target system administrators in order to demonstrate…unauthorised access to complete enterprise networks.…
The tool, PuTTY Hijack, can be used when access…has been gained to a Windows system when PuTTY is running.…The tool identifies the PuTTY processes and injects a DLL,…which then copies all commands and responses…to the attacker's terminal.…PuTTY Hijack works only on PuTTY version 0.6.…However, it inspired another tool called PuTTY Rider,…which works on all PuTTY releases.…PuTTY Rider can be downloaded from the site shown here.…
This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles.
Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website.
- Hijacking a network session, such as a Telnet session
- Understand web sessions
- Intercepting sessions via man-in-the-middle or man-in-the-browser attacks
- Downgrading a session by stripping SSL
- Using ARP poisoning through Subterfuge
- Hijacking an HTTP session through cookies
- Using hijacking defense tools: Zed Attack Proxy and Cain
- Service hijacking (DNS and SSH)
- Hijacking in the physical world: cars and drones