Summarize the course and look at what's next.
- [Instructor] I'd really like to thank you…for joining me for this course.…I hope you enjoyed learning about session hijacking.…There's always something new in cybersecurity,…and if you're interested in learning more,…then check out the full cybersecurity…ethical hacking segment of the library,…where new security testing courses are added regularly.…You'll find courses on using Kali Linux,…information gathering, denial of service, and much more.…I'd also like to invite you to go to my author page,…where you can find some additional courses on cybersecurity.…
If you want to get hands-on with some of the common tools,…then do take a look at Practical Cybersecurity…and the Introduction to Kali Linux.…If you're wanting to learn about security for the cloud,…then Cybersecurity for Cloud Computing is for you.…You might also want to see what my colleague…on the Cybersecurity Ethical Hacking series, Lisa Bock,…has for you on her home page.…Thanks again for joining me on this course,…and I hope to see you again soon.…
This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles.
Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website.
- Hijacking a network session, such as a Telnet session
- Understand web sessions
- Intercepting sessions via man-in-the-middle or man-in-the-browser attacks
- Downgrading a session by stripping SSL
- Using ARP poisoning through Subterfuge
- Hijacking an HTTP session through cookies
- Using hijacking defense tools: Zed Attack Proxy and Cain
- Service hijacking (DNS and SSH)
- Hijacking in the physical world: cars and drones