Explain how the TCP protocol works, and its use of sequence and acknowledgment numbers.
- [Instructor] Session hijacking is often thought to be…an arcane and highly technical attack on systems,…and certainly does exploit the technical implementation…of digital communications channels,…but in reality, the tools available to the tester…provide a straightforward means…of looking for hijack vulnerabilities.…Nevertheless, it's useful to understand…what's happening under the hood.…When we talk about session hijacking,…we mean the ability of a tester or an attacker…to take control of the communications between the user…and a host service during their session.…
This allows the attacker to gain access to the service…without having to authenticate, because the legitimate user…has already authenticated their access.…Session hijacking takes advantage of weaknesses…in internet protocols, wireless LANs, and web services.…Communicating across the internet requires…the use of the internet protocol.…This carries a number of sub-protocols,…one of which is known…as the transmission control protocol, or TCP.…IP carries the packets and TCP provides the control…
This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles.
Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website.
- Hijacking a network session, such as a Telnet session
- Understand web sessions
- Intercepting sessions via man-in-the-middle or man-in-the-browser attacks
- Downgrading a session by stripping SSL
- Using ARP poisoning through Subterfuge
- Hijacking an HTTP session through cookies
- Using hijacking defense tools: Zed Attack Proxy and Cain
- Service hijacking (DNS and SSH)
- Hijacking in the physical world: cars and drones