Exploring Defensive Strategies
Session hijacking relies, in part, on many of the prerequisites needed to successfully sniff a network. For instance, session hijacking
Read moreSession hijacking relies, in part, on many of the prerequisites needed to successfully sniff a network. For instance, session hijacking
Read moreNetwork-level session hijacking is a hijacking method that focuses on exploiting a TCP/IP connection after initialization or authentication has occurred.
Read moreSession hijacking at the application level focuses on gaining access to a host by obtaining legitimate session IDs from the
Read moreYou can categorize a session hijacking attack as either an active attack or a passive attack. Let’s look at both.
Read moreDoS attacks come in many flavors, each of which is critical to your understanding of the nature of the DoS
Read moreOver the last decade, some of the biggest security threats have come from the use of social networking. The rapid
Read moreAn attacker will look for targets of opportunity or potential victims who have the most to offer. Some common targets
Read moreSniffing tools are extremely common applications. A few interesting ones are: Wireshark One of the most widely known and used
Read moreWhen you are working with Trojans and other malware, you need to be aware of covert and overt channels. As
Read moreA wide range of tools exist that are used to take control of a victim’s system and leave behind a
Read more