Time
1 hour 18 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Transcription

00:00
Hello and welcome back to the chorus. My name is David Apprentice. And then the previous video. What we've demonstrated is basically how to capture packets now down the road, I'll be explaining and the supplemental material as to exactly how to go through and sort and pick out the session i d and how to input it.
00:15
What I'd like to do for this example in this video is show on the Windows machine How we have the session I d in the security and also on the Cali Lynette's machine.
00:24
How we've been able to store such material
00:27
just to make a notation. I did use a Firefox extension called Cookie Bro Editor, which I'm gonna go out and walk you through now.
00:34
So going through this again, we see the session I d.
00:40
Let's refresh.
00:42
You'll see multiple sessions. Now if I go back here, refresh this
00:47
have now captured and my peace precession of the exact value on Callie Lennox that's stored on the Windows machine as well as the security.
00:57
So as a test we want to do is click on log in,
01:00
refresh it now, before even logging in, Let's just say OK, let's bypasses. Did this work? Let's go back to the security.
01:07
That PHP then that worked.
01:11
So what I'll be doing in future videos showcasing exactly how we can do this. That my stuff just wanted to give you guys a current example.
01:19
Thank you very much. Look forward to seeing you in the next video.

Up Next

Session Hijacking

This course covers session hijacking, which is where an attacker takes over a legitimately established session between a user and host. This is normally seen between a user and a Web server, but it could occur with a Telnet session or other TCP-based connection.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor
Instructor Profile Image
Dave Kupratis
Instructor