Chapter 6

Layer 5: The Session Layer

Introduction

This chapter discusses the Session layer (layer 5) on the Open Systems Interconnect (OSI) model. In this chapter, we examine a number of well–known techniques that are used to attack sessions, and discuss the underlying qualities of the protocols that enable these attacks. We examine the limited options available for defending against session–based attacks, and how to leverage Session–layer qualities to aid in defending networks. This chapter focuses on the Session layer features of Transmission Control Protocol (TCP).

The Session layer ...

Get Hack the Stack now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.