Steps Involved in Session Hijacking

Steps Involved in Session Hijacking

  1. An attacker sits between the two communicating hosts , i.e tries to sniff the communication packets
  2. Attacker intercepts the packets and analyse every packet.
  3. Now attacker exploits the target’s active session once he analysed and found required tcp packets
  4. Attacker disconnects the target from its current session and takes over the session of the target host.
  5. Now attacker tries to exploit the target host by injecting the infected packets into the target host.

Leave a Reply

Your email address will not be published. Required fields are marked *