Category Archives: Ethical Hacking

Pentest plan 1NSP3CT

Before conducting the process of penetration testing on the designated system for 1NSP3CT, It is recommended and possibly crucial to make a plan beforehand. Here is the Excel file of the pentest plan for EH final project. Get the whole story »

TCP Session Hijacking with SHijack

What is Session Hijacking?

Session hijacking is when an authorized user accesses another user’s actual network connection. This is usually to bypass password authentication, which is the starting point of the session.

TCP/IP hijacking, also called active sniffing, involves the attacker gaining access to a host in the network and logically disconnecting it from the network. The attacker then inserts another machine with the same IP address. This happens quickly and gives the attacker access to the session and to all the information on the original system. The server will not know that this has occurred and will respond as if the client were trusted.

Get the whole story »