SlideShare a Scribd company logo
Module X
Session Hijacking
Ethical Hacking
Version 5
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module Objective
This module will familiarize you with the following:
Session Hijacking
Difference between Spoofing and Hijacking
Steps to Conduct a Session Hijacking Attack
Types of Session Hijacking
Performing Sequence Number Prediction
TCP/IP Hijacking
Session Hijacking Tools
Countermeasures to Session Hijacking
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module Flow
Session Hijacking
Countermeasures
Session Hijacking Tools
TCP/ IP Hijacking
Types Of Session Hijacking
Session Hijacking Steps
Spoofing vs. Hijacking
Sequence Number
Prediction
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
What is Session Hijacking?
TCP session hijacking is when
a hacker takes over a TCP
session between two machines
Since most authentication
only occurs at the start of a
TCP session, this allows the
hacker to gain access to a
machine
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Understanding Session Hijacking
Understanding the flow of
message packets over the
Internet by dissecting the TCP
stack
Understanding the security
issues involved in the use of
IPv4 standard
Familiarizing with the basic
attacks possible due to the
IPv4 standard
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
John (Victim)
Spoofing vs. Hijacking
In a spoofing attack, an attacker does not actively take
another user offline to perform the attack
He pretends to be another user, or machine to gain access
Attacker
I am
John and
here are m
y credentials
Server
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Spoofing vs. Hijacking (cont’d)
With a hijacking, an attacker takes over an existing
session, which means he relies on the legitimate user to
make a connection and authenticate
Subsequently, the attacker takes over the session
John (Victim)
Attacker
ARP spoofs John’s IP and
hijacks the session
Server
John logs on to the server
with his credentials
Attacker predicts the sequence and
kills John’s connection
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Steps in Session Hijacking
1. Place yourself between the victim and the
target (you must be able to sniff the
network)
2. Monitor the flow of packets
3. Predict the sequence number
4. Kill the connection to the victim’s machine
5. Take over the session
6. Start injecting packets to the target server
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Types of Session Hijacking
There are two types of session hijacking attacks:
Active
• In an active attack, an attacker finds an active session and
takes over
Passive
• With a passive attack, an attacker hijacks a session, but sits
back, and watches and records all the traffic that is being sent
forth
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
ACK
Seq: 4002Ack :7001
Bob
Server
SYN
Seq.:4000
SYN/ACK
Seq:7000, Ack: 4001
The 3-Way Handshake
If the attacker can anticipate the next SEQ/ACK number Bob will
send, he will spoof Bob’s address and start a communication with the
server
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
TCP Concepts 3-Way Handshake
1. Bob initiates a connection with the server. Bob sends a packet to the
server with the SYN bit set
2. The server receives this packet and sends back a packet with the SYN
bit and an ISN (Initial Sequence Number) for the server
3. Bob sets the ACK bit acknowledging the receipt of the packet and
increments the sequence number by 1
4. The two machines have successfully established a session
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Sequence Numbers
Sequence numbers are important in providing a reliable
communication and are also crucial for hijacking a
session
Sequence numbers are a 32-bit counter. Therefore, the
possible combinations can be over 4 billion
Sequence numbers are used to tell the receiving
machine what order the packets should go in, when they
are received
Therefore, an attacker must successfully guess the
sequence numbers in order to hijack a session
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Sequence Number Prediction
After a client sends a connection request (SYN) packet to the
server, the server will respond (SYN-ACK) with a sequence number
of choosing, which then must be acknowledged (ACK) by the client
This sequence number is predictable; the attack connects to a
server first with its own IP address, records the sequence number
chosen, then opens a second connection from a forged IP address
The attack doesn't see the SYN-ACK (or any other packet) from the
server, but can guess the correct response
If the source IP address is used for authentication, then the
attacker can use the one-sided communication to break into the
server
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
TCP/IP Hijacking
TCP/IP hijacking is a hacking technique that
uses spoofed packets to take over a connection
between a victim and a target machine
The victim's connection hangs, and the hacker
is then able to communicate with the host
machine as if the attacker were the victim
To launch a TCP/IP hijacking attack, the
hacker must be on the same network as the
victim
The target and the victim machines can be
anywhere
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
TCP/IP Hijacking
Source: 10.1.0.100
Destination: 10.1.0.200
Seq#: 1429775024
Ack#: 1250510167
Len: 71
Source: 10.1.0.200
Destination: 10.1.0.100
Seq#: 1250510000
Ack#: 1429775024
Len: 167
Source: 10.1.0.100
Destination: 10.1.0.200
Seq#: 1429775000
Ack#: 1250510000
Len: 24
Computer A
Computer B
Hacker
1
2
3
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
RST Hijacking
RST hijacking involves injecting an authentic-looking
reset (RST) packet
Spoof the source address and predict the
acknowledgment number
The victim will believe that the source actually sent the
reset packet and will reset the connection
RST Packet
Spoofed Source Address with
predicted ACK number
Connection Reset
1
2
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Programs that Perform Session
Hijacking
There are several programs available
that perform session hijacking
The following are a few that belong in
this category:
• Juggernaut
• Hunt
• TTY Watcher
• IP Watcher
• T-Sight
• Paros HTTP Hijacker
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Juggernaut is a network sniffer that can be used
to hijack TCP sessions. It runs on Linux
operating systems
Juggernaut can be set to watch for all network
traffic, or it can be given a keyword (e.g. a
password ) to look out for
The objective of this program is to provide
information about ongoing network sessions
The attacker can see all of the sessions and
choose a session to hijack
Hacking Tool: Juggernaut
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Hunt is a program that can
be used to listen, intercept,
and hijack active sessions on
a network
Hunt offers:
• Connection management
• ARP spoofing
• Resetting connection
• Watching connection
• MAC address discovery
• Sniffing TCP traffic
Hacking Tool: Hunt
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Hacking Tool: TTY Watcher
TTY watcher is a utility to monitor and control users on
a single system
Anything the user types into a monitored TTY window
will be sent to the underlying process. In this way, you
are sharing a log in session with another user
After a TTY has been stolen, it can be returned to the
user as though nothing happened
(Available only for Sun Solaris Systems)
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Hacking Tool: IP Watcher
http://engarde.com
IP watcher is a commercial session
hijacking tool that allows you to
monitor connections and has active
facilities for taking over a session
The program can monitor all
connections on a network, allowing
an attacker to display an exact copy
of a session in real-time, just as the
user of the session sees the data
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Session Hijacking Tool: T-Sight
http://engarde.com
T-Sight is a session hijacking tool
for Windows
With T-Sight, you can monitor all of
your network connections (i.e.
traffic) in real-time, and observe the
composition of any suspicious
activity that takes place
T-Sight has the capability to hijack
any TCP sessions on the network
Due to security reasons, Engarde
Systems licenses this software to
pre-determined IP addresses
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Remote TCP Session Reset Utility
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Paros HTTP Session Hijacking Tool
Paros is a man-in-the-middle proxy and
application vulnerability scanner
It allows users to intercept, modify, and
debug HTTP and HTTPS data on-the-fly
between a web server and a client browser
It also supports spidering, proxy-chaining,
filtering, and application vulnerability
scanning
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Paros Untitled Session
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Paros HTTP Session Hijacking Tool
Victim in Boston
The victim’s
machine is
infected with
trojan which sets
the proxy of IE to
attacker’s
machine
Hacker in Russia
Target Server in
NYC
Hacker intercepts and
injects his own packets
since http traffic is
routed through him
IP: X.2.2.2
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Dangers Posed by Hijacking
1. Most computers are vulnerable (using TCP/IP)
2. You can do little to protect against it unless you switch to another
secure protocol
3. Hijacking is simple to launch
4. Most countermeasures do not work unless you use encryption
5. Hijacking is dangerous (theft of identity, fraud, and so on)
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Protecting against Session Hijacking
1. Use encryption
2. Use a secure protocol
3. Limit incoming connections
4. Minimize remote access
5. Educate the employees
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Countermeasure: IP Security
Is a set of protocols developed by
the IETF to support the secure
exchange of packets at the IP layer
Deployed widely to implement
Virtual Private Networks (VPNs)
IPsec supports two encryption
modes:
• Transport
• Tunnel
• The sending and receiving devices
must share a public key
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
IP-SEC
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Summary
In the case of a session hijacking, an attacker relies on the
legitimate user to connect and authenticate, and will then take over
the session
In a spoofing attack, the attacker pretends to be another user or
machine to gain access
Successful session hijacking is extremely difficult, and is only
possible when a number of factors are under the attacker's control
Session hijacking can be active or passive in nature depending on
the degree of involvement of the attacker
A variety of tools exist to aid the attacker in perpetrating a session
hijack
Session hijacking could be dangerous, and therefore, a need for
implementing strict countermeasures
Ad

More Related Content

What's hot (20)

Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
Vi Tính Hoàng Nam
 
Ceh v5 module 14 sql injection
Ceh v5 module 14 sql injectionCeh v5 module 14 sql injection
Ceh v5 module 14 sql injection
Vi Tính Hoàng Nam
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
amiable_indian
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
Vi Tính Hoàng Nam
 
Module 2 (footprinting)
Module 2 (footprinting)Module 2 (footprinting)
Module 2 (footprinting)
Wail Hassan
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
VIKAS SINGH BHADOURIA
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
Vi Tính Hoàng Nam
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
Katie Nickels
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
Phannarith Ou, G-CISO
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
Morane Decriem
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
Vi Tính Hoàng Nam
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
How to Plan Purple Team Exercises
How to Plan Purple Team ExercisesHow to Plan Purple Team Exercises
How to Plan Purple Team Exercises
Haydn Johnson
 
Password Attacks.pdf
Password Attacks.pdfPassword Attacks.pdf
Password Attacks.pdf
Andy32903
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
 
Introduction to Windows Dictionary Attacks
Introduction to Windows Dictionary AttacksIntroduction to Windows Dictionary Attacks
Introduction to Windows Dictionary Attacks
Scott Sutherland
 
CHFI v10
CHFI v10CHFI v10
CHFI v10
SagarNegi10
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
Vi Tính Hoàng Nam
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
amiable_indian
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
Vi Tính Hoàng Nam
 
Module 2 (footprinting)
Module 2 (footprinting)Module 2 (footprinting)
Module 2 (footprinting)
Wail Hassan
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
Vi Tính Hoàng Nam
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
Katie Nickels
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
Morane Decriem
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
Vi Tính Hoàng Nam
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
How to Plan Purple Team Exercises
How to Plan Purple Team ExercisesHow to Plan Purple Team Exercises
How to Plan Purple Team Exercises
Haydn Johnson
 
Password Attacks.pdf
Password Attacks.pdfPassword Attacks.pdf
Password Attacks.pdf
Andy32903
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
 
Introduction to Windows Dictionary Attacks
Introduction to Windows Dictionary AttacksIntroduction to Windows Dictionary Attacks
Introduction to Windows Dictionary Attacks
Scott Sutherland
 

Viewers also liked (9)

Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
Vuz Dở Hơi
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Mike McLain
 
CCNA - Switching Concepts made easy
CCNA - Switching Concepts made easyCCNA - Switching Concepts made easy
CCNA - Switching Concepts made easy
sushmil123
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
Vi Tính Hoàng Nam
 
0407 ceh certificate
0407   ceh certificate0407   ceh certificate
0407 ceh certificate
Wayne Parton
 
Spanning tree
Spanning treeSpanning tree
Spanning tree
Swapnil Kapate
 
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
Vi Tính Hoàng Nam
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
Vi Tính Hoàng Nam
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
Vuz Dở Hơi
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Mike McLain
 
CCNA - Switching Concepts made easy
CCNA - Switching Concepts made easyCCNA - Switching Concepts made easy
CCNA - Switching Concepts made easy
sushmil123
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
Vi Tính Hoàng Nam
 
0407 ceh certificate
0407   ceh certificate0407   ceh certificate
0407 ceh certificate
Wayne Parton
 
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
Vi Tính Hoàng Nam
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
Vi Tính Hoàng Nam
 
Ad

Similar to Ceh v5 module 10 session hijacking (20)

Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
leminhvuong
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
Wail Hassan
 
chapter5sfawefafsfsfasfafafsafsafasfasfafafasfaf.ppt
chapter5sfawefafsfsfasfafafsafsafasfasfafafasfaf.pptchapter5sfawefafsfsfasfafafsafsafasfasfafafasfaf.ppt
chapter5sfawefafsfsfasfafafsafsafasfasfafafasfaf.ppt
VerdiFerdiansyah1
 
ip spoofing
ip spoofingip spoofing
ip spoofing
vipin soni
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
Vi Tính Hoàng Nam
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
guestd05b31
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptx
AsmaaLafi1
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
Internet security
Internet securityInternet security
Internet security
gOhElprashanT
 
Internet security
Internet securityInternet security
Internet security
gohel
 
Keshav tiwari 20803001_TCP Session Hijacking.pptx
Keshav tiwari 20803001_TCP Session Hijacking.pptxKeshav tiwari 20803001_TCP Session Hijacking.pptx
Keshav tiwari 20803001_TCP Session Hijacking.pptx
केशव तिवारी
 
Introduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptxIntroduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptx
SahilSwe
 
Internet Security
Internet SecurityInternet Security
Internet Security
Peter R. Egli
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
Greater Noida Institute Of Technology
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
MSA Technosoft
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
Presentation1
Presentation1Presentation1
Presentation1
Rahul Polara
 
presentation of professionalism harwares.ppt
presentation of professionalism harwares.pptpresentation of professionalism harwares.ppt
presentation of professionalism harwares.ppt
JayPatil820512
 
31.ppt
31.ppt31.ppt
31.ppt
KarmanChandi
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
priya_kp03
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
leminhvuong
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
Wail Hassan
 
chapter5sfawefafsfsfasfafafsafsafasfasfafafasfaf.ppt
chapter5sfawefafsfsfasfafafsafsafasfasfafafasfaf.pptchapter5sfawefafsfsfasfafafsafsafasfasfafafasfaf.ppt
chapter5sfawefafsfsfasfafafsafsafasfasfafafasfaf.ppt
VerdiFerdiansyah1
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptx
AsmaaLafi1
 
Internet security
Internet securityInternet security
Internet security
gohel
 
Introduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptxIntroduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptx
SahilSwe
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
presentation of professionalism harwares.ppt
presentation of professionalism harwares.pptpresentation of professionalism harwares.ppt
presentation of professionalism harwares.ppt
JayPatil820512
 
Ad

More from Vi Tính Hoàng Nam (20)

CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
Vi Tính Hoàng Nam
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
Vi Tính Hoàng Nam
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
Vi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
Vi Tính Hoàng Nam
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
Vi Tính Hoàng Nam
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
Vi Tính Hoàng Nam
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
Vi Tính Hoàng Nam
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
Vi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
Vi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
Vi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
Vi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
Vi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
Vi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
Vi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
Vi Tính Hoàng Nam
 
I phone v1.2_e
I phone v1.2_eI phone v1.2_e
I phone v1.2_e
Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
Vi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
Vi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
Vi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
Vi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
Vi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
Vi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
Vi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
Vi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
Vi Tính Hoàng Nam
 

Recently uploaded (20)

HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 

Ceh v5 module 10 session hijacking

  • 2. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Module Objective This module will familiarize you with the following: Session Hijacking Difference between Spoofing and Hijacking Steps to Conduct a Session Hijacking Attack Types of Session Hijacking Performing Sequence Number Prediction TCP/IP Hijacking Session Hijacking Tools Countermeasures to Session Hijacking
  • 3. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Module Flow Session Hijacking Countermeasures Session Hijacking Tools TCP/ IP Hijacking Types Of Session Hijacking Session Hijacking Steps Spoofing vs. Hijacking Sequence Number Prediction
  • 4. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited What is Session Hijacking? TCP session hijacking is when a hacker takes over a TCP session between two machines Since most authentication only occurs at the start of a TCP session, this allows the hacker to gain access to a machine
  • 5. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Understanding Session Hijacking Understanding the flow of message packets over the Internet by dissecting the TCP stack Understanding the security issues involved in the use of IPv4 standard Familiarizing with the basic attacks possible due to the IPv4 standard
  • 6. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited John (Victim) Spoofing vs. Hijacking In a spoofing attack, an attacker does not actively take another user offline to perform the attack He pretends to be another user, or machine to gain access Attacker I am John and here are m y credentials Server
  • 7. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Spoofing vs. Hijacking (cont’d) With a hijacking, an attacker takes over an existing session, which means he relies on the legitimate user to make a connection and authenticate Subsequently, the attacker takes over the session John (Victim) Attacker ARP spoofs John’s IP and hijacks the session Server John logs on to the server with his credentials Attacker predicts the sequence and kills John’s connection
  • 8. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Steps in Session Hijacking 1. Place yourself between the victim and the target (you must be able to sniff the network) 2. Monitor the flow of packets 3. Predict the sequence number 4. Kill the connection to the victim’s machine 5. Take over the session 6. Start injecting packets to the target server
  • 9. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Types of Session Hijacking There are two types of session hijacking attacks: Active • In an active attack, an attacker finds an active session and takes over Passive • With a passive attack, an attacker hijacks a session, but sits back, and watches and records all the traffic that is being sent forth
  • 10. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited ACK Seq: 4002Ack :7001 Bob Server SYN Seq.:4000 SYN/ACK Seq:7000, Ack: 4001 The 3-Way Handshake If the attacker can anticipate the next SEQ/ACK number Bob will send, he will spoof Bob’s address and start a communication with the server
  • 11. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited TCP Concepts 3-Way Handshake 1. Bob initiates a connection with the server. Bob sends a packet to the server with the SYN bit set 2. The server receives this packet and sends back a packet with the SYN bit and an ISN (Initial Sequence Number) for the server 3. Bob sets the ACK bit acknowledging the receipt of the packet and increments the sequence number by 1 4. The two machines have successfully established a session
  • 12. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Sequence Numbers Sequence numbers are important in providing a reliable communication and are also crucial for hijacking a session Sequence numbers are a 32-bit counter. Therefore, the possible combinations can be over 4 billion Sequence numbers are used to tell the receiving machine what order the packets should go in, when they are received Therefore, an attacker must successfully guess the sequence numbers in order to hijack a session
  • 13. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Sequence Number Prediction After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of choosing, which then must be acknowledged (ACK) by the client This sequence number is predictable; the attack connects to a server first with its own IP address, records the sequence number chosen, then opens a second connection from a forged IP address The attack doesn't see the SYN-ACK (or any other packet) from the server, but can guess the correct response If the source IP address is used for authentication, then the attacker can use the one-sided communication to break into the server
  • 14. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited TCP/IP Hijacking TCP/IP hijacking is a hacking technique that uses spoofed packets to take over a connection between a victim and a target machine The victim's connection hangs, and the hacker is then able to communicate with the host machine as if the attacker were the victim To launch a TCP/IP hijacking attack, the hacker must be on the same network as the victim The target and the victim machines can be anywhere
  • 15. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited TCP/IP Hijacking Source: 10.1.0.100 Destination: 10.1.0.200 Seq#: 1429775024 Ack#: 1250510167 Len: 71 Source: 10.1.0.200 Destination: 10.1.0.100 Seq#: 1250510000 Ack#: 1429775024 Len: 167 Source: 10.1.0.100 Destination: 10.1.0.200 Seq#: 1429775000 Ack#: 1250510000 Len: 24 Computer A Computer B Hacker 1 2 3
  • 16. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited RST Hijacking RST hijacking involves injecting an authentic-looking reset (RST) packet Spoof the source address and predict the acknowledgment number The victim will believe that the source actually sent the reset packet and will reset the connection RST Packet Spoofed Source Address with predicted ACK number Connection Reset 1 2
  • 17. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Programs that Perform Session Hijacking There are several programs available that perform session hijacking The following are a few that belong in this category: • Juggernaut • Hunt • TTY Watcher • IP Watcher • T-Sight • Paros HTTP Hijacker
  • 18. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Juggernaut is a network sniffer that can be used to hijack TCP sessions. It runs on Linux operating systems Juggernaut can be set to watch for all network traffic, or it can be given a keyword (e.g. a password ) to look out for The objective of this program is to provide information about ongoing network sessions The attacker can see all of the sessions and choose a session to hijack Hacking Tool: Juggernaut
  • 19. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Hunt is a program that can be used to listen, intercept, and hijack active sessions on a network Hunt offers: • Connection management • ARP spoofing • Resetting connection • Watching connection • MAC address discovery • Sniffing TCP traffic Hacking Tool: Hunt
  • 20. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: TTY Watcher TTY watcher is a utility to monitor and control users on a single system Anything the user types into a monitored TTY window will be sent to the underlying process. In this way, you are sharing a log in session with another user After a TTY has been stolen, it can be returned to the user as though nothing happened (Available only for Sun Solaris Systems)
  • 21. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Hacking Tool: IP Watcher http://engarde.com IP watcher is a commercial session hijacking tool that allows you to monitor connections and has active facilities for taking over a session The program can monitor all connections on a network, allowing an attacker to display an exact copy of a session in real-time, just as the user of the session sees the data
  • 22. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Session Hijacking Tool: T-Sight http://engarde.com T-Sight is a session hijacking tool for Windows With T-Sight, you can monitor all of your network connections (i.e. traffic) in real-time, and observe the composition of any suspicious activity that takes place T-Sight has the capability to hijack any TCP sessions on the network Due to security reasons, Engarde Systems licenses this software to pre-determined IP addresses
  • 23. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Remote TCP Session Reset Utility
  • 24. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Paros HTTP Session Hijacking Tool Paros is a man-in-the-middle proxy and application vulnerability scanner It allows users to intercept, modify, and debug HTTP and HTTPS data on-the-fly between a web server and a client browser It also supports spidering, proxy-chaining, filtering, and application vulnerability scanning
  • 25. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Paros Untitled Session
  • 26. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Paros HTTP Session Hijacking Tool Victim in Boston The victim’s machine is infected with trojan which sets the proxy of IE to attacker’s machine Hacker in Russia Target Server in NYC Hacker intercepts and injects his own packets since http traffic is routed through him IP: X.2.2.2
  • 27. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Dangers Posed by Hijacking 1. Most computers are vulnerable (using TCP/IP) 2. You can do little to protect against it unless you switch to another secure protocol 3. Hijacking is simple to launch 4. Most countermeasures do not work unless you use encryption 5. Hijacking is dangerous (theft of identity, fraud, and so on)
  • 28. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Protecting against Session Hijacking 1. Use encryption 2. Use a secure protocol 3. Limit incoming connections 4. Minimize remote access 5. Educate the employees
  • 29. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Countermeasure: IP Security Is a set of protocols developed by the IETF to support the secure exchange of packets at the IP layer Deployed widely to implement Virtual Private Networks (VPNs) IPsec supports two encryption modes: • Transport • Tunnel • The sending and receiving devices must share a public key
  • 30. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited IP-SEC
  • 31. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Summary In the case of a session hijacking, an attacker relies on the legitimate user to connect and authenticate, and will then take over the session In a spoofing attack, the attacker pretends to be another user or machine to gain access Successful session hijacking is extremely difficult, and is only possible when a number of factors are under the attacker's control Session hijacking can be active or passive in nature depending on the degree of involvement of the attacker A variety of tools exist to aid the attacker in perpetrating a session hijack Session hijacking could be dangerous, and therefore, a need for implementing strict countermeasures