Ethical Hacking: Session Hijacking

Pluralsight
Course Summary
Session hijacking is considered one of the top two risks on the web today. Understanding how to detect it and identify risks in both your web applications and your network is absolutely critical. This course goes through the risks in depth and helps you to become an ethical hacker with a strong session hijacking understanding. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
Session persistence is a fundamental concept in information systems. On the web, for example, which is dependent on the stateless HTTP protocol, session persistence is a key component of features ranging from shopping carts to the ability to logon. At a lower level on the network tier, the TCP protocol relies on sessions for communication between machines such as a client and a server. The confidentiality and integrity of this communication can be seriously impacted by a session hijacking attack. Learning how to identify these risks is an essential capability for the ethical hacker. Systems are frequently built insecurely and readily expose these flaws. Conversely, the risks are often easy to defend against by implementing simple patterns within the application. This course walks through both the risks and the defenses. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
Understanding Session Hijacking- 18m 31s
—Overview 2m 27s
—What Is Session Hijacking? 1m 43s
—Types of Session Hijacking 2m 58s
—Attack Vectors 3m 40s
—The Impact of Session Hijacking 3m 26s
—Session Hijacking and the OWASP Top 10 2m 44s
—Summary 1m 30sSession Persistence in Web Applications- 31m 43s
—Overview 1m 44s
—The Stateless Nature of HTTP 2m 53s
—Persisting State Over HTTP 5m 45s
—Session Persistence in Cookies 8m 49s
—Session Persistence in the URL 6m 33s
—Session Persistence in Hidden Form Fields 3m 22s
—Summary 2m 36sHijacking Sessions in Web Applications- 47m 18sNetwork and Client Level Session Hijacking- 36m 53sMitigating the Risk of Session Hijacking- 45m 56sAutomating Session Hijack Attacks- 27m 27s