1 hour 14 minutes

Video Transcription

everyone Welcome back to the core. So in the last video, we just wrapped up our lab on such a high checking. So again, we just use a tool called Better Cap inside of Kelly Lennox. And we went ahead and grab the user credentials
in this video, we're just gonna wrap up the course.
So what do we cover? What? We covered the basics of session hijacking. Now, this was not a deep dive course at all. And if you're interested in learning more about session hijacking and penetration, testing or ethical hacking, as many people call it in general, I definitely encourage you to check out number one the basic penetration testing an ethical hacking course that I have on Sai Buri.
A swell a C O S c. P. Course, because that's gonna give you a lot of the hands on,
um, or an intermediate type of level.
So, as always, thank you again for watching this course, and I'll see you in the next one

Session Hijacking

This course covers session hijacking, where an attacker takes over a legitimately established session between a user and host. This is normally seen between a user and a Web server, but can occur with a Telnet session or other TCP-based connection.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor