This course covers session hijacking, where an attacker takes over a legitimately established session between a user and host. This is normally seen between a user and a Web server, but can occur with a Telnet session or other TCP-based connection.
Learning Objectives
By the end of this course, students should be able to:
- Explain what session hijacking is
- Perform a session hijacking attack
Framework Connections
Specialty Areas
- Network Services
- Exploitation Analysis
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.