- 1-2 hours worth of material
- LinkedIn Learning
- English
Course Overview
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
Course Circullum
Introduction
- Understanding session hijacking
- What you should know before watching this course
- Disclaimer
- Understanding TCP sequence numbers
- Hijacking a Telnet session
- Real-world hijacks
- Understanding web sessions
- Understanding WebSockets
- Banking on Zero
- Hijacking sessions using man-in-the-browser
- Intercepting sessions through man-in-the-middle
- Stripping SSL to downgrade the session
- Hijacking an HTTP session through cookies
- Using Subterfuge to hijack sessions through ARP poisoning
- Using Webscarab-NG as a web proxy
- Using Zed Attack Proxy (ZAP)
- Using Cain
- Hijacking SSH sessions
- DNS hijacking
- Cloud hijacking
- Going physical: Hijacking cars and drones
- Getting more physical with drones
- Next steps
Item Reviews - 3
Submit Reviews
This Course Include:
Introduction
- Understanding session hijacking
- What you should know before watching this course
- Disclaimer
- Understanding TCP sequence numbers
- Hijacking a Telnet session
- Real-world hijacks
- Understanding web sessions
- Understanding WebSockets
- Banking on Zero
- Hijacking sessions using man-in-the-browser
- Intercepting sessions through man-in-the-middle
- Stripping SSL to downgrade the session
- Hijacking an HTTP session through cookies
- Using Subterfuge to hijack sessions through ARP poisoning
- Using Webscarab-NG as a web proxy
- Using Zed Attack Proxy (ZAP)
- Using Cain
- Hijacking SSH sessions
- DNS hijacking
- Cloud hijacking
- Going physical: Hijacking cars and drones
- Getting more physical with drones
- Next steps
- Provider:LinkedIn Learning
- Certificate:Certificate Available
- Language:English
- Duration:1-2 hours worth of material
- Language CC: