Course Content

Module 1: Introduction

04:14
1.1 Course Introduction
07:18
1.2 Session Hijacking Basics

Module 2: Labs

08:06
2.1 Man in the Middle Hijack Part 1
05:44
2.2 Man in the Middle Hijack Part 2
01:39
2.3 Lab Introduction
03:56
2.4 Installing Virtual Box
16:53
2.5 Installing Windows VM
09:00
2.6 Installing XAMPP
06:52
2.7 DVWA Setup
05:57
2.8 Kali Linux DVWA Configuration
03:30
2.9 Session Hijack Part 1
01:23
2.10 Session Hijack Part 2
01:21
2.11 Lab Wrap-Up

Module 3: Conclusion

03:01
3.1 Conclusion

Course Description

This course covers session hijacking, which is where an attacker takes over a legitimately established session between a user and host. This is normally seen between a user and a Web server, but it could occur with a Telnet session or other TCP-based connection. We will cover basic information about session hijacking in Module 1. Since this is a skill-based course, we will then move into performing hands-on labs in Module 2. Dave Kupratis will also show how to set up and configure your own virtual environment for performing his example lab. The course will culminate with some assessment labs that students will need to perform (found in the supplemental resources section). Knowledge of session hijacking can be beneficial to defenders; however, this course is intended for ethical hackers (attackers). This course will be most beneficial for students that are studying for penetration testing related certifications, like the EC-Council Certified Ethical Hacker (CEH), CompTIA Pentest+, GPEN, or OSCP.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor
Instructor Profile Image
Dave Kupratis
Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Session Hijacking Certificate of Completion

Verticals

CyberSecurity