Computer Security and Penetration Testing: Session Hijacking
Computer Security and Penetration Testing: Session Hijacking
Computer Security and Penetration Testing: Session Hijacking
Testing
Chapter 8
Session Hijacking
Objectives
• Define session hijacking
• Understand what session hijacking entails
• Identify the styles of session hijacking
Chapter 9
Hacking Network Devices
Objectives
Identify the vulnerabilities of proxy servers
Identify the vulnerabilities of routers and switches
Identify the vulnerabilities of firewalls
Identify the vulnerabilities of virtual private networks (VPNs)
Perform the following functions
Restrict users from accessing specific Web sites using
Internet access rules
Mask the IP of the users’ PCs within the network from
outside connections
Maintain logs of the requests and the details of users that are
accessing the Internet
Maintain a cache of the sites that users on the network have
visited
A proxy server is simple to install
It is often part of the operating system of a server
A proxy server is simple to use
And is often included in router and firewall software
The user interacting via the proxy server is hidden
But can be traced through the log stored on the proxy server
Attacks groups:
Attacks made upon proxy servers
Attacks made through proxy servers
Attacks made through proxy servers include
Buffer overflow attacks
Denial-of-service attacks
Session-hijacking attacks
Concealed identity
Proxy servers hide a user’s real identity
Hackers use this model to perform hacking operations
anonymously
Hacker’s IP and time of attack is, however, maintained on the
proxy server
Two ways to avoid this logging problem
Hacker might use a chain of proxy servers
Hacker can spoof the valid authentication details of a
network
If the attacker has access to the console port of the router
He can easily set a remote user for the router or switch
Default password for Cisco routers is admin/admin
See Table 9-1