© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2021
A. SheikhCertified Ethical Hacker (CEH) Preparation Guidehttps://doi.org/10.1007/978-1-4842-7258-9_8

8. Session Hijacking

Ahmed Sheikh1  
(1)
Miami, FL, USA
 

In this chapter, you will learn about session hijacking, including the steps involved, the different types, and the countermeasures that can be used to protect against this type of attack.

By the end of this chapter, you will be able to
  1. 1.

    Identify the proper order of steps used to conduct a session hijacking attack.

     
  2. 2.

    Recognize different types of session hijacking.

     
  3. 3.

    Identify TCP/IP hijacking.

     
  4. 4.

    Describe countermeasures to protect against session hijacking.

     

Session Hijacking

Session hijacking happens when ...

Get Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.