In this chapter, you will learn about session hijacking, including the steps involved, the different types, and the countermeasures that can be used to protect against this type of attack.
- 1.
Identify the proper order of steps used to conduct a session hijacking attack.
- 2.
Recognize different types of session hijacking.
- 3.
Identify TCP/IP hijacking.
- 4.
Describe countermeasures to protect against session hijacking.
Session Hijacking
Session hijacking happens when ...