From the course: Ethical Hacking: Session Hijacking
Understanding session hijacking - Linux Tutorial
From the course: Ethical Hacking: Session Hijacking
Understanding session hijacking
- [Malcolm] One of the more sophisticated forms of cyber attack involves taking over an existing session from an unsuspecting user. This enables an attacker to gain immediate access to anything in the user's current session. The attacker will also have the same privileges as the victim, a serious problem if the victim is a systems administrator. I'm Malcolm Shore and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course, I'll explain how an attacker can hijack your sessions by misusing a range of protocols including TCP, web, and DNS. I'll also describe how wireless session hijacking is used to take over physical devices, such as remotely piloted cars and drone aircraft. Let's get started with the LinkedIn Learning Session Hijacking course.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.