logo

Session Hijacking is a type of cyber-attack

   

Added on  2023-05-27

5 Pages849 Words92 Views
Running head: SESSION HIJACKING
Session Hijacking
Name of the Student
Name of the University
Session Hijacking  is a type of cyber-attack_1
2
SESSION HIJACKING
1. Session hijacking is a type of cyber-attack that works on principle of computer sessions.
It takes advantage of active sessions. There are various tools used for session hijacking including
Droidsheep. Droidsheep is an android app that is used for testing the network security. However,
it can also be used for hacking messengers and WiFi networks. Droidsheep application helps in
hacking session key that can be used in both sides of a connection and hack into any messengers.
This application can be downloaded easily on any Android device (Bugliesi et al. 2015). The use
of Droidsheep requires root access for performing in the network. Droidsheep is able to gather
information from any wireless networks. The app steals session keys and use them to connect to
specific website. Therefore, this attack compromise session token by stealing a valid session
token for unauthorized access to internet server. Droidsheep works as a router and intercept all
traffic in the network (Manivannan and Sathiyamoorthy 2017). Hybrid session hijacking
implement both the modes of attack in the passive and active mode for successfully completing
the attacks.
2. Session hijacking plays an important role in stealing confidential and private information
that passes through network. It has the capability of stealing information without knowledge of
user. Various techniques by which session hijacking can be done are as follows:
Using packet Sniffers: In this attack, it collects session ID of the victim for gaining access
to server by using some packet sniffers.
Session Hijacking  is a type of cyber-attack_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CSI2102 - Information Security: Assignment
|17
|1220
|277

Man-In-The-Middle Attack
|18
|3456
|309

Wireless Network Vulnerabilities and Security Measures - Desklib
|7
|1988
|258

Risks Associated with Cloud Computing Technology
|5
|851
|438

Network Devices Security: Threats, Potential Damages, and Mitigation Strategies
|6
|1897
|178

Risk Assessment Report- Docs
|11
|1091
|30