- Регистрация
- 27 Авг 2018
- Сообщения
- 37,500
- Реакции
- 534,219
- Тема Автор Вы автор данного материала? |
- #1
Pluralsight is not an official partner or accredited training center of EC-Council. This course goes through the risks of session hijacking in depth and helps you to become an ethical hacker with a strong session hijacking understanding.
Pluralsight is not an official partner or accredited training center of EC-Council. Session persistence is a fundamental concept in information systems. On the web, for example, which is dependent on the stateless HTTP protocol, session persistence is a key component of features ranging from shopping carts to the ability to logon. At a lower level on the network tier, the TCP protocol relies on sessions for communication between machines such as a client and a server. The confidentiality and integrity of this communication can be seriously impacted by a session hijacking attack. Learning how to identify these risks is an essential capability for the ethical hacker. Systems are frequently built insecurely and readily expose these flaws. Conversely, the risks are often easy to defend against by implementing simple patterns within the application. This course walks through both the risks and the defenses. This course is part of the Ethical Hacking Series. Ethical Hacking (CEH Prep 2018)
About the author
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.
SALES PAGE:
DOWNLOAD: