Ethical Hacking: Session Hijacking

  • 1-2 hours worth of material
  • LinkedIn Learning
  • English
Ethical Hacking: Session Hijacking

Course Overview

Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.

Course Circullum

Introduction
  • Understanding session hijacking
  • What you should know before watching this course
  • Disclaimer
1. Network Session Hijacking
  • Understanding TCP sequence numbers
  • Hijacking a Telnet session
  • Real-world hijacks
2. Web Session Hijacking
  • Understanding web sessions
  • Understanding WebSockets
  • Banking on Zero
  • Hijacking sessions using man-in-the-browser
  • Intercepting sessions through man-in-the-middle
  • Stripping SSL to downgrade the session
  • Hijacking an HTTP session through cookies
  • Using Subterfuge to hijack sessions through ARP poisoning
  • Using Webscarab-NG as a web proxy
3. Additional Tools
  • Using Zed Attack Proxy (ZAP)
  • Using Cain
4. Service Hijacking
  • Hijacking SSH sessions
  • DNS hijacking
  • Cloud hijacking
5. Hijacking in the Physical World
  • Going physical: Hijacking cars and drones
  • Getting more physical with drones
Conclusion
  • Next steps
out of 5.0
5 Star 85%
4 Star 75%
3 Star 53%
1 Star 20%

Item Reviews - 3

Submit Reviews

Free Trial Available

This Course Include:
Introduction
  • Understanding session hijacking
  • What you should know before watching this course
  • Disclaimer
1. Network Session Hijacking
  • Understanding TCP sequence numbers
  • Hijacking a Telnet session
  • Real-world hijacks
2. Web Session Hijacking
  • Understanding web sessions
  • Understanding WebSockets
  • Banking on Zero
  • Hijacking sessions using man-in-the-browser
  • Intercepting sessions through man-in-the-middle
  • Stripping SSL to downgrade the session
  • Hijacking an HTTP session through cookies
  • Using Subterfuge to hijack sessions through ARP poisoning
  • Using Webscarab-NG as a web proxy
3. Additional Tools
  • Using Zed Attack Proxy (ZAP)
  • Using Cain
4. Service Hijacking
  • Hijacking SSH sessions
  • DNS hijacking
  • Cloud hijacking
5. Hijacking in the Physical World
  • Going physical: Hijacking cars and drones
  • Getting more physical with drones
Conclusion
  • Next steps
  • Provider:LinkedIn Learning
  • Certificate:Certificate Available
  • Language:English
  • Duration:1-2 hours worth of material
  • Language CC:

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today