Announcement
Collapse
No announcement yet.
Search Result
Collapse
8 results in 0.0033 seconds.
Keywords
Members
Tags
-
Session Hijacking - Mitigations
Session hijacking is a big part of the common attack surface and something the pentester must take into consideration when defending networks from attacks.... -
Network Session Hijacking
Session hijacking on the network level is a hijacking method that focuses on exploiting a TCP/IP connection after the initialization or authentication... -
Connection Desynchronization
The purpose of the TCP 3-way handshake is to establish a connection and part of this is synchronizing the sequence numbers for both ends of the connection.... -
ARP Cache Poisoning
ARP is responsible for translating (layer 3) IP addresses to MAC (layer 2) addresses. The relationship between IP addresses and MAC addresses are stored... -
Blind Hijacking
Blind hijacking describes a type of session hijacking in which the attacker cannot capture return traffic from the host connection. This means that the... -
Session Hijacking - Web Applications
Session hijacking at the application level focuses on gaining access to a target by obtaining legitimate session IDs from the victim.
A session... -
Session Hijacking - Active and Passive Attacks
Session hijacking attacks can be categorized into active and passive attacks.
Active Session Hijacking
A session hijacking attack can... -
Session Hijacking
Session hijacking is an interception in the line of communication that allows an attacker to either assume the role of the authenticated user or to stay...