YoVDO

Ethical Hacking: Session Hijacking

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Network Security Courses Web Security Courses Session Hijacking Courses

Course Description

Overview

Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.

Syllabus

Introduction
  • Understanding session hijacking
  • What you should know before watching this course
  • Disclaimer
1. Network Session Hijacking
  • Understanding TCP sequence numbers
  • Hijacking a Telnet session
  • Real-world hijacks
2. Web Session Hijacking
  • Understanding web sessions
  • Understanding WebSockets
  • Banking on Zero
  • Hijacking sessions using man-in-the-browser
  • Intercepting sessions through man-in-the-middle
  • Stripping SSL to downgrade the session
  • Hijacking an HTTP session through cookies
  • Using Subterfuge to hijack sessions through ARP poisoning
  • Using Webscarab-NG as a web proxy
  • Defeating the Hijack
3. Additional Tools
  • Using Zed Attack Proxy (ZAP)
  • Using Cain
4. Service Hijacking
  • Hijacking SSH sessions
  • DNS hijacking
  • Cloud hijacking
5. Hijacking in the Physical World
  • Going physical: Hijacking cars and drones
  • Getting more physical with drones
Conclusion
  • Next steps

Taught by

Malcolm Shore

Related Courses

Don's Introduction to Ethical Hacking for Beginners
Udemy
Complete Cyber Security Course: Go From Zero To Hero
Udemy
Performing Incident Response and Handling
Pluralsight
Learn SQL +Security(pen) testing from Scratch
Udemy
Programming Foundations: Web Security
LinkedIn Learning