SlideShare a Scribd company logo
1 of 62
*
*
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking

More Related Content

What's hot

The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
Ch 7: Programming for Security Professionals
Ch 7: Programming for Security ProfessionalsCh 7: Programming for Security Professionals
Ch 7: Programming for Security ProfessionalsSam Bowne
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Rishab garg
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 

What's hot (20)

The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Ch 7: Programming for Security Professionals
Ch 7: Programming for Security ProfessionalsCh 7: Programming for Security Professionals
Ch 7: Programming for Security Professionals
 
Cyber security
Cyber securityCyber security
Cyber security
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
SECURITY SERVICES
SECURITY SERVICESSECURITY SERVICES
SECURITY SERVICES
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
IOT Security
IOT SecurityIOT Security
IOT Security
 

Viewers also liked

Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackinganonymousrider
 
Cehv8 - Module 06: Trojans and Backdoors
Cehv8 - Module 06: Trojans and BackdoorsCehv8 - Module 06: Trojans and Backdoors
Cehv8 - Module 06: Trojans and BackdoorsVuz Dở Hơi
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsVi Tính Hoàng Nam
 
Cehv8 - Module 05: System Hacking
Cehv8 - Module 05: System HackingCehv8 - Module 05: System Hacking
Cehv8 - Module 05: System HackingVuz Dở Hơi
 
Modyul 2: ANG MATAAS NA GAMIT AT TUNGUHIN NG ISIP AT KILOS-LOOB
Modyul 2: ANG MATAAS NA GAMIT AT TUNGUHIN NG ISIP AT KILOS-LOOBModyul 2: ANG MATAAS NA GAMIT AT TUNGUHIN NG ISIP AT KILOS-LOOB
Modyul 2: ANG MATAAS NA GAMIT AT TUNGUHIN NG ISIP AT KILOS-LOOBThelma Singson
 
Mataas na gamit at tunguhin ng isip at kilos loob
Mataas na gamit at tunguhin ng isip at kilos loobMataas na gamit at tunguhin ng isip at kilos loob
Mataas na gamit at tunguhin ng isip at kilos loobDon Joreck Santos
 
Edukasyon sa pagpapakatao grade 10
Edukasyon sa pagpapakatao grade 10Edukasyon sa pagpapakatao grade 10
Edukasyon sa pagpapakatao grade 10Thelma Singson
 
Isyung Moral tungkol sa Seksuwalidad
Isyung Moral tungkol sa SeksuwalidadIsyung Moral tungkol sa Seksuwalidad
Isyung Moral tungkol sa SeksuwalidadMa. Hazel Forastero
 
ESP GRADE 10 LEARNER'S MODULE
ESP GRADE 10 LEARNER'S MODULEESP GRADE 10 LEARNER'S MODULE
ESP GRADE 10 LEARNER'S MODULEPRINTDESK by Dan
 

Viewers also liked (12)

Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Cehv8 - Module 06: Trojans and Backdoors
Cehv8 - Module 06: Trojans and BackdoorsCehv8 - Module 06: Trojans and Backdoors
Cehv8 - Module 06: Trojans and Backdoors
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Cehv8 - Module 05: System Hacking
Cehv8 - Module 05: System HackingCehv8 - Module 05: System Hacking
Cehv8 - Module 05: System Hacking
 
Modyul 2: ANG MATAAS NA GAMIT AT TUNGUHIN NG ISIP AT KILOS-LOOB
Modyul 2: ANG MATAAS NA GAMIT AT TUNGUHIN NG ISIP AT KILOS-LOOBModyul 2: ANG MATAAS NA GAMIT AT TUNGUHIN NG ISIP AT KILOS-LOOB
Modyul 2: ANG MATAAS NA GAMIT AT TUNGUHIN NG ISIP AT KILOS-LOOB
 
Mataas na gamit at tunguhin ng isip at kilos loob
Mataas na gamit at tunguhin ng isip at kilos loobMataas na gamit at tunguhin ng isip at kilos loob
Mataas na gamit at tunguhin ng isip at kilos loob
 
Edukasyon sa pagpapakatao grade 10
Edukasyon sa pagpapakatao grade 10Edukasyon sa pagpapakatao grade 10
Edukasyon sa pagpapakatao grade 10
 
ESP Module Grade 10
ESP Module Grade 10ESP Module Grade 10
ESP Module Grade 10
 
Isyung Moral tungkol sa Buhay
Isyung Moral  tungkol sa BuhayIsyung Moral  tungkol sa Buhay
Isyung Moral tungkol sa Buhay
 
Isyung Moral tungkol sa Seksuwalidad
Isyung Moral tungkol sa SeksuwalidadIsyung Moral tungkol sa Seksuwalidad
Isyung Moral tungkol sa Seksuwalidad
 
Edukasyon sa Pagpapakatao Grade 8 Teacher's Guide
Edukasyon sa Pagpapakatao Grade 8 Teacher's Guide Edukasyon sa Pagpapakatao Grade 8 Teacher's Guide
Edukasyon sa Pagpapakatao Grade 8 Teacher's Guide
 
ESP GRADE 10 LEARNER'S MODULE
ESP GRADE 10 LEARNER'S MODULEESP GRADE 10 LEARNER'S MODULE
ESP GRADE 10 LEARNER'S MODULE
 

More from Avirot Mitamura

Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Avirot Mitamura
 
Mental illness-at-work-race-en-20921
Mental illness-at-work-race-en-20921Mental illness-at-work-race-en-20921
Mental illness-at-work-race-en-20921Avirot Mitamura
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceAvirot Mitamura
 
CEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and BackdoorsCEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and BackdoorsAvirot Mitamura
 
CEH - Module 5 : System Hacking
CEH - Module 5 : System HackingCEH - Module 5 : System Hacking
CEH - Module 5 : System HackingAvirot Mitamura
 
CEH - Module4 : Enumeration
CEH - Module4 : EnumerationCEH - Module4 : Enumeration
CEH - Module4 : EnumerationAvirot Mitamura
 
Kingdom of Thailand - visa
Kingdom of Thailand - visaKingdom of Thailand - visa
Kingdom of Thailand - visaAvirot Mitamura
 
Preparation company limited registration
Preparation company limited registrationPreparation company limited registration
Preparation company limited registrationAvirot Mitamura
 
Elevate - Three Disciplines of Strategic Thinking
Elevate - Three Disciplines of Strategic ThinkingElevate - Three Disciplines of Strategic Thinking
Elevate - Three Disciplines of Strategic ThinkingAvirot Mitamura
 
Lead with-humility-krames-en-22453
Lead with-humility-krames-en-22453Lead with-humility-krames-en-22453
Lead with-humility-krames-en-22453Avirot Mitamura
 
Rising to Power of Exceptional Executives
Rising to Power of Exceptional ExecutivesRising to Power of Exceptional Executives
Rising to Power of Exceptional ExecutivesAvirot Mitamura
 
Imperial violet by poodle attacks on ss-lv3
Imperial violet by poodle attacks on ss-lv3Imperial violet by poodle attacks on ss-lv3
Imperial violet by poodle attacks on ss-lv3Avirot Mitamura
 
Bash Code-Injection Briefing
Bash Code-Injection BriefingBash Code-Injection Briefing
Bash Code-Injection BriefingAvirot Mitamura
 
Excise department project_fin
Excise department project_finExcise department project_fin
Excise department project_finAvirot Mitamura
 
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550Avirot Mitamura
 
Executive presentation [4] - NHSO IT Master Plan B.C.2550
Executive presentation [4] - NHSO IT Master Plan B.C.2550Executive presentation [4] - NHSO IT Master Plan B.C.2550
Executive presentation [4] - NHSO IT Master Plan B.C.2550Avirot Mitamura
 

More from Avirot Mitamura (20)

Rpa case study 2020 r1
Rpa case study 2020 r1Rpa case study 2020 r1
Rpa case study 2020 r1
 
Ui path rpa_intro_v1
Ui path rpa_intro_v1Ui path rpa_intro_v1
Ui path rpa_intro_v1
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
Mental illness-at-work-race-en-20921
Mental illness-at-work-race-en-20921Mental illness-at-work-race-en-20921
Mental illness-at-work-race-en-20921
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
 
CEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and BackdoorsCEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and Backdoors
 
CEH - Module 5 : System Hacking
CEH - Module 5 : System HackingCEH - Module 5 : System Hacking
CEH - Module 5 : System Hacking
 
CEH - Module4 : Enumeration
CEH - Module4 : EnumerationCEH - Module4 : Enumeration
CEH - Module4 : Enumeration
 
Kingdom of Thailand - visa
Kingdom of Thailand - visaKingdom of Thailand - visa
Kingdom of Thailand - visa
 
Preparation company limited registration
Preparation company limited registrationPreparation company limited registration
Preparation company limited registration
 
Elevate - Three Disciplines of Strategic Thinking
Elevate - Three Disciplines of Strategic ThinkingElevate - Three Disciplines of Strategic Thinking
Elevate - Three Disciplines of Strategic Thinking
 
Lead with-humility-krames-en-22453
Lead with-humility-krames-en-22453Lead with-humility-krames-en-22453
Lead with-humility-krames-en-22453
 
Rising to Power of Exceptional Executives
Rising to Power of Exceptional ExecutivesRising to Power of Exceptional Executives
Rising to Power of Exceptional Executives
 
Imperial violet by poodle attacks on ss-lv3
Imperial violet by poodle attacks on ss-lv3Imperial violet by poodle attacks on ss-lv3
Imperial violet by poodle attacks on ss-lv3
 
Bash Code-Injection Briefing
Bash Code-Injection BriefingBash Code-Injection Briefing
Bash Code-Injection Briefing
 
Excise department project_fin
Excise department project_finExcise department project_fin
Excise department project_fin
 
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
 
Executive presentation [4] - NHSO IT Master Plan B.C.2550
Executive presentation [4] - NHSO IT Master Plan B.C.2550Executive presentation [4] - NHSO IT Master Plan B.C.2550
Executive presentation [4] - NHSO IT Master Plan B.C.2550
 
PKI101 polk
PKI101 polkPKI101 polk
PKI101 polk
 

CEH - Module 11 : Session Hijacking

Editor's Notes

  1. What is Session Hijacking? The Session Hijacking attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token. Because http communication uses many different TCP connections, the web server needs a method to recognize every user’s connections. The most useful method depends on a token that the Web Server sends to the client browser after a successful client authentication. A session token is normally composed of a string of variable width and it could be used in different ways, like in the URL, in the header of the http requisition as a cookie, in other parts of the header of the http request, or yet in the body of the http requisition. The Session Hijacking attack compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server. The session token could be compromised in different ways; the most common are: Predictable session token; Session Sniffing; Client-side attacks (XSS, malicious JavaScript Codes, Trojans, etc); Man-in-the-middle attack Man-in-the-browser attack