Updated
1/7/2021Released
9/7/2016This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles.
Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website.
- Hijacking a network session
- Understand web sessions
- Intercepting sessions
- Downgrading a session by stripping SSL
- Using ARP poisoning through Subterfuge
- Hijacking an HTTP session through cookies
- Using hijacking defense tools
- Service hijacking (DNS and SSH)
- Hijacking in the physical world: cars and drones
Skill Level Intermediate
Duration
Views
- [Malcolm] One of the more sophisticated forms of cyber attack involves taking over an existing session from an unsuspecting user. This enables an attacker to gain immediate access to anything in the user's current session. The attacker will also have the same privileges as the victim, a serious problem if the victim is a systems administrator. I'm Malcolm Shore and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course, I'll explain how an attacker can hijack your sessions by misusing a range of protocols including TCP, web, and DNS. I'll also describe how wireless session hijacking is used to take over physical devices, such as remotely piloted cars and drone aircraft. Let's get started with the LinkedIn Learning Session Hijacking course.
Share this video
Embed this video
Video: Understanding session hijacking