Time
1 hour 14 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
everyone Welcome back to the core. So in the last video, we just wrapped up our lab on such a high checking. So again, we just use a tool called Better Cap inside of Kelly Lennox. And we went ahead and grab the user credentials
00:11
in this video, we're just gonna wrap up the course.
00:13
So what do we cover? What? We covered the basics of session hijacking. Now, this was not a deep dive course at all. And if you're interested in learning more about session hijacking and penetration, testing or ethical hacking, as many people call it in general, I definitely encourage you to check out number one the basic penetration testing an ethical hacking course that I have on Sai Buri.
00:32
A swell a C O S c. P. Course, because that's gonna give you a lot of the hands on,
00:37
um, or an intermediate type of level.
00:40
So, as always, thank you again for watching this course, and I'll see you in the next one

Session Hijacking

This course covers session hijacking, where an attacker takes over a legitimately established session between a user and host. This is normally seen between a user and a Web server, but can occur with a Telnet session or other TCP-based connection.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor