YoVDO

Ethical Hacking: Session Hijacking

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Network Security Courses Web Security Courses Session Hijacking Courses

Course Description

Overview

Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.

Syllabus

Introduction
  • Understanding session hijacking
  • What you should know before watching this course
  • Disclaimer
1. Network Session Hijacking
  • Understanding TCP sequence numbers
  • Hijacking a Telnet session
  • Real-world hijacks
2. Web Session Hijacking
  • Understanding web sessions
  • Understanding WebSockets
  • Banking on Zero
  • Hijacking sessions using man-in-the-browser
  • Intercepting sessions through man-in-the-middle
  • Stripping SSL to downgrade the session
  • Hijacking an HTTP session through cookies
  • Using Subterfuge to hijack sessions through ARP poisoning
  • Using Webscarab-NG as a web proxy
  • Defeating the Hijack
3. Additional Tools
  • Using Zed Attack Proxy (ZAP)
  • Using Cain
4. Service Hijacking
  • Hijacking SSH sessions
  • DNS hijacking
  • Cloud hijacking
5. Hijacking in the Physical World
  • Going physical: Hijacking cars and drones
  • Getting more physical with drones
Conclusion
  • Next steps

Taught by

Malcolm Shore

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX