Ethical Hacking: Session Hijacking
Offered By: LinkedIn Learning
Course Description
Overview
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
Syllabus
Introduction
- Understanding session hijacking
- What you should know before watching this course
- Disclaimer
- Understanding TCP sequence numbers
- Hijacking a Telnet session
- Real-world hijacks
- Understanding web sessions
- Understanding WebSockets
- Banking on Zero
- Hijacking sessions using man-in-the-browser
- Intercepting sessions through man-in-the-middle
- Stripping SSL to downgrade the session
- Hijacking an HTTP session through cookies
- Using Subterfuge to hijack sessions through ARP poisoning
- Using Webscarab-NG as a web proxy
- Defeating the Hijack
- Using Zed Attack Proxy (ZAP)
- Using Cain
- Hijacking SSH sessions
- DNS hijacking
- Cloud hijacking
- Going physical: Hijacking cars and drones
- Getting more physical with drones
- Next steps
Taught by
Malcolm Shore
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity