Certified Ethical Hacker (CEH) : Session Hijacking

0
581

Session Hijacking Techniques

Session Hijacking process is categorized into the following three techniques:

  • Stealing
  • Guessing
  • Brute-Forcing

Session Hijacking Process

  • Sniffing
  • Monitoring
  • Session Desynchronization
  • Session ID
  • Command Injection

Types of Session Hijacking

  • Active Attack
  • Passive Attack

Session Hijacking in OSI Model

  • Network Level Hijacking
  • Application Level Hijacking

Spoofing vs. Hijacking

Application Level Session Hijacking

  • Compromising Session IDs using Sniffing
  • Compromising Session IDs by Predicting Session Token
  • Compromising Session IDs Using Man-in-the-Middle Attack
  • Compromising Session IDs Using Man-in-the-Browser Attack
  • Compromising Session IDs Using Client-side Attacks

Network-level Session Hijacking

The 3-Way Handshake

  • TCP/IP Hijacking
  • Source Routing
  • RST Hijacking
  • Blind Hijacking
  • Forged ICMP and ARP Spoofing
  • UDP Hijacking

Session Hijacking Countermeasures

IPSec

Components of IPsec

Modes of IPsec

There are two working modes of IPSec namely tunnel and transport mode.

  • IPSec Tunnel Mode
  • IPsec Transport Mode

LEAVE A REPLY

Please enter your comment!
Please enter your name here