CEH v12: Hijacking Concepts and Countermeasures
CEH v12
| Intermediate
- 4 videos | 1h 22m 41s
- Includes Assessment
- Earns a Badge
Sessions are like a verified conversation between trusted systems, which makes session hijacking a common form of attack. In this course, you'll learn about session hijacking, including how it's accomplished and the different types. Session hijacking attacks can be performed at the network level, so you'll also explore common network-based session hijacking attacks such as UDP, TCP, and RST hijacking. Next, you'll move on to examine common application level session hijacking attacks such as man-in-the-middle, man-in-the-browser, cross-site scripting, and cross-site request forgery. Finally, you'll learn about common session hijacking security controls and countermeasures, as well as best practices like using encrypted protocols and secure session handling techniques. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Define session hijacking, describe how it can be accomplished, and recognize the different typesRecall the details necessary to perform common network based session hijacking attacks like udp, tcp, and rst hijackingidentify tools and details that can be used to perform session hijacking using man-in-the-middle attacksrecognize the details of common network based session hijacking attacksDescribe the man-in-the-browser application level session hijacking attack
-
describe common application level session hijacking attacksidentify the protocols or components that can be taken advantage of by an application level session hijacking attackidentify the types of cross-site scripting (xss) application level session hijacking attacksDescribe common session hijacking security detection methods and best practicesrecognize common session hijacking security controls, best practices, and secure session handling techniques
IN THIS COURSE
-
13m 30sUpon completion of this video, you will be able to define session hijacking, describe how it can be accomplished, and recognize the different types. FREE ACCESS
-
29m 4sAfter completing this video, you will be able to recognize the details of common network-based session hijacking attacks such as UDP, TCP, and RST hijacking used to perform man-in-the-middle (MITM) attacks. FREE ACCESS
-
25m 53sUpon completion of this video, you will be able to describe common application level session hijacking attacks such as man-in-the-middle, man-in-the-browser, cross-site scripting (XSS), and cross-site request forgery (XSRF). FREE ACCESS
-
14m 14sAfter completing this video, you will be able to describe common session-hijacking security controls and countermeasures like detection methods and tools, as well as best-practices like using encrypted protocols and secure session handling techniques. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.