From the course: Ethical Hacking: Session Hijacking

Understanding session hijacking - Linux Tutorial

From the course: Ethical Hacking: Session Hijacking

Start my 1-month free trial

Understanding session hijacking

- [Malcolm] One of the more sophisticated forms of cyber attack involves taking over an existing session from an unsuspecting user. This enables an attacker to gain immediate access to anything in the user's current session. The attacker will also have the same privileges as the victim, a serious problem if the victim is a systems administrator. I'm Malcolm Shore and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course, I'll explain how an attacker can hijack your sessions by misusing a range of protocols including TCP, web, and DNS. I'll also describe how wireless session hijacking is used to take over physical devices, such as remotely piloted cars and drone aircraft. Let's get started with the LinkedIn Learning Session Hijacking course.

Contents