SlideShare a Scribd company logo
1 of 30
SESSION
HIJACKING
PRESENTED BY:
MISS. GAYATRI V.
KAPSE
Contents:
 Introduction to session hijacking
 TCP session hijacking
 TCP session hijacking with packet
blocking
 Session hijacking tools
 UDP hijacking
 Prevention
What is session?
• A lasting connection between a user and a
server usually involving the exchange of many
requests
5. Validate
Session
CLIENT SERVER
SESSIO
N DATA
1. Request
connection
2.Create session
3. Session id
4. Session id passed
6. Retrieve Session id
7. Successful response
Session Hijacking
 Session Hijacking is the act of taking
control of a user session after
successfully obtaining of an
authenticate session Id.
 Session hijacking involves an attack
using captured session id to grab
control of legitimate users web
application session while that
application still in progress.
 Session hijacking takes place at
TCP SESSION HIJACKING
 Hacker takes control of a TCP session
between two hosts.
 It can be hijacked after hosts have
authenticated successfully.
 The authentication process followed
by TCP is defined as a three-way
handshake method.
Three way handshake
Categories of TCP Session
Hijacking
 Based on the anticipation of sequence
numbers there are two types of TCP
hijacking:
◦ Blind Hijacking
◦ Man-in-the-middle (MITM) attack
Man-in-the-middle (MITM)
A hacker can also be "inline" between B and C using a
sniffing program to watch the sequence numbers and
acknowledge numbers in the IP packets transmitted
between B and C. And then hijack the connection. This is
known as a "man-in-the-middle attack".
Continuous ACK transfer
 Losing the ACK packet
 Ending connection
 Resynchronizing client and server
ACK attack
ACK attack without DoS
ACK loop
TCP session hijacking with
packet blocking
Methods of TCP session
hijacking with packet blocking
 Route Table Modification
Route table can be seen by netstat –
nra command at console prompt in
Windows or Linux/ Unix O.S
There are two entries in Linux route
table
1. Way to all the node within the LAN
2. Way to all the addresses not on the
LAN
Linux route table
Sections of route table
 The active route
 The active connection
Route table in action
Active connection section
 Network addresses of computers that
are connected to host computer can
be seen by netstat –F (or netstat –n)
on Linux box and active connection
section on window box.
Route table modification
attack
ARP(Address Resolution
Protocol) attack
 ARP table on computer stores the IP
address and corresponding MAC
address
 ARP table can be seen by arp –a
command at console prompt.
ARP request
01:23:a1:b2:ff:09
Has
192.168.0.78 192.168.0.102
HACK
Who has
192.16.0.78
01:b5:44:8e:01:d
7
Has
192.168.0.78
Capturing the ARP broadcast response
Session hijacking tools
Hunt
• It performs sniffing and session hijacking
• Hunt tool provides following menu option
1. Listing
2. Watching
3. Resetting connections
• It hijack a session through ARP attack
• Allows hacker to synchronize connection
among host and server during session
hijacking.
UDP Hijacking
 It does not have error recovery
features
 More vulnerable to hijacking
 Vitim is local computer not server
Prevention
 Encryption
 Storm watching
Encryption method in SSH and
TLS
Storm watching
 Refers to watch for abnormal
increases in network traffic and alert
the security officer when they occur.
 Two packets with the same header
information but different sizes could be
evidence of hijacking.
SUMMERY
 Hijacking is the process of taking the
authority of the authorized person and
inject itself in network as legitimate
user.
 Hijacking can be done in TCP session
hijacking, packet blocking, UDP
hijacking.
 Hunt is session hijacking tool.
 For prevention from hijacking SSH
and TLS protocols are used.
QUESTIONS
 Explain how session hijacking is
achieved?
 Explain TCP session hijacking with
packet blocking?
 Explain following terms:
i) Hunt ii) Storm watching
THANK
YOU!!!

More Related Content

What's hot (20)

Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active Directory
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
DNS spoofing/poisoning Attack
DNS spoofing/poisoning AttackDNS spoofing/poisoning Attack
DNS spoofing/poisoning Attack
 
Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
Deep dive into ssrf
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
SSRF workshop
SSRF workshop SSRF workshop
SSRF workshop
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 

Similar to SESSION HIJACKING: TCP, TOOLS, PREVENTION

what is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfwhat is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfbrijeshagarwa329898l
 
Internet security
Internet securityInternet security
Internet securitygohel
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumerationleminhvuong
 
Remote procedure calls
Remote procedure callsRemote procedure calls
Remote procedure callsimnomus
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingVi Tính Hoàng Nam
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxAsmaaLafi1
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigationsMukesh Chaudhari
 
Monitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lanMonitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a laneSAT Publishing House
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...idsecconf
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunickamiable_indian
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 

Similar to SESSION HIJACKING: TCP, TOOLS, PREVENTION (20)

Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
what is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfwhat is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdf
 
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
Remote procedure calls
Remote procedure callsRemote procedure calls
Remote procedure calls
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptx
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
 
Monitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lanMonitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lan
 
Lecture9
Lecture9Lecture9
Lecture9
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
6005679.ppt
6005679.ppt6005679.ppt
6005679.ppt
 
Rpc
RpcRpc
Rpc
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 

SESSION HIJACKING: TCP, TOOLS, PREVENTION

  • 2. Contents:  Introduction to session hijacking  TCP session hijacking  TCP session hijacking with packet blocking  Session hijacking tools  UDP hijacking  Prevention
  • 3. What is session? • A lasting connection between a user and a server usually involving the exchange of many requests 5. Validate Session CLIENT SERVER SESSIO N DATA 1. Request connection 2.Create session 3. Session id 4. Session id passed 6. Retrieve Session id 7. Successful response
  • 4. Session Hijacking  Session Hijacking is the act of taking control of a user session after successfully obtaining of an authenticate session Id.  Session hijacking involves an attack using captured session id to grab control of legitimate users web application session while that application still in progress.  Session hijacking takes place at
  • 5. TCP SESSION HIJACKING  Hacker takes control of a TCP session between two hosts.  It can be hijacked after hosts have authenticated successfully.  The authentication process followed by TCP is defined as a three-way handshake method.
  • 7. Categories of TCP Session Hijacking  Based on the anticipation of sequence numbers there are two types of TCP hijacking: ◦ Blind Hijacking ◦ Man-in-the-middle (MITM) attack
  • 8. Man-in-the-middle (MITM) A hacker can also be "inline" between B and C using a sniffing program to watch the sequence numbers and acknowledge numbers in the IP packets transmitted between B and C. And then hijack the connection. This is known as a "man-in-the-middle attack".
  • 9. Continuous ACK transfer  Losing the ACK packet  Ending connection  Resynchronizing client and server
  • 13. TCP session hijacking with packet blocking
  • 14. Methods of TCP session hijacking with packet blocking  Route Table Modification Route table can be seen by netstat – nra command at console prompt in Windows or Linux/ Unix O.S There are two entries in Linux route table 1. Way to all the node within the LAN 2. Way to all the addresses not on the LAN
  • 16. Sections of route table  The active route  The active connection
  • 17. Route table in action
  • 18. Active connection section  Network addresses of computers that are connected to host computer can be seen by netstat –F (or netstat –n) on Linux box and active connection section on window box.
  • 20. ARP(Address Resolution Protocol) attack  ARP table on computer stores the IP address and corresponding MAC address  ARP table can be seen by arp –a command at console prompt.
  • 23. Session hijacking tools Hunt • It performs sniffing and session hijacking • Hunt tool provides following menu option 1. Listing 2. Watching 3. Resetting connections • It hijack a session through ARP attack • Allows hacker to synchronize connection among host and server during session hijacking.
  • 24. UDP Hijacking  It does not have error recovery features  More vulnerable to hijacking  Vitim is local computer not server
  • 26. Encryption method in SSH and TLS
  • 27. Storm watching  Refers to watch for abnormal increases in network traffic and alert the security officer when they occur.  Two packets with the same header information but different sizes could be evidence of hijacking.
  • 28. SUMMERY  Hijacking is the process of taking the authority of the authorized person and inject itself in network as legitimate user.  Hijacking can be done in TCP session hijacking, packet blocking, UDP hijacking.  Hunt is session hijacking tool.  For prevention from hijacking SSH and TLS protocols are used.
  • 29. QUESTIONS  Explain how session hijacking is achieved?  Explain TCP session hijacking with packet blocking?  Explain following terms: i) Hunt ii) Storm watching