This course covers session hijacking, where an attacker takes over a legitimately established session between a user and host. This is normally seen between a user and a Web server, but can occur with a Telnet session or other TCP-based connection.
By the end of this course, students should be able to:
Explain what session hijacking is
Perform a session hijacking attack