Session Hijacking
Session Hijacking
Session Hijacking
Session Hijacking
EC-Council, . Certified Ethical Hacker (CEH) Version 12. Available from:
VitalSource Bookshelf, (12th Edition). International Council of E-
.Commerce Consultants (EC Council), 2022
What is Session Hijacking?
• Session hijacking refers to an attack in which an attacker
seizes control of a valid TCP communication session
between two computers
• Attackers can sniff all the traffic from the established TCP
sessions and perform identity theft, information theft,
fraud, etc.
Network-Level Hijacking
Network-level hijacking can be defined as the interception of packets during the transmission
between a client and the server in a TCP or UDP session
Application-Level Hijacking
Application-level hijacking refers to gaining control over the HTTP’s user session by obtaining the
session IDs
Spoofing vs. Hijacking
Spoofing Attack Hijacking
• Session hijacking is the process of
• An attacker pretends to be another seizing control of an existing active
user or machine (victim) to gain access session
• The attacker does not seize control of • The attacker relies on the legitimate
an existing active session; instead, he user to create a connection and
or she initiates a new session using the authenticate
victim’s stolen credentials
Application-Level Session Hijacking
In a session hijacking attack, a session token is stolen or a valid session token is predicted to gain
unauthorized access to the web server
• It works with an already installed Trojan horse and acts between the
browser and its security mechanisms