02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

296 Chapter 12 ■ Session Hijacking<br />

you’ll face. We’ve already covered a few of these, so we’re ahead of the game! Just pay<br />

attention to the sequence and relate it to what you’ve already learned.<br />

1. Referring back to Chapter 9 once more, you must have a means of sniffing or capturing<br />

the traffic between the victim machines. This places you in the position required to<br />

perform the hijack.<br />

2. Predict the sequence numbers of the packets traversing the network. Remember that<br />

null packets can be used to increment the host sequence numbers, thereby desynchronizing<br />

the victim’s connection and making sequence number prediction easier.<br />

3. Perform a denial-of-service attack on the victim’s machine, or reset their connection<br />

in some fashion so you can assume the victim’s role as the legitimate client. Remember<br />

that in a passive hijacking, the victim connection is not necessarily severed; the traffic<br />

between the victim and the host is simply monitored, and you wait for the opportune<br />

time to act.<br />

4. Once you take over the victim’s session, you can start injecting packets into the server,<br />

imitating the authenticated client.<br />

Be sure that you understand TCP hijacking and the packet sequencing an<br />

attacker uses to implement the attack. Refer to Chapter 9 if necessary to<br />

help you get comfortable with these topics. Both will show up on the exam<br />

and will be applied to session hijacking.<br />

Let’s go back to blind hijacking for a moment. As we discussed earlier, in blind hijacking<br />

the attacker is not able to see the result of the injected packets, nor are they able to<br />

sniff the packets successfully. This creates a major challenge for the attacker because<br />

sequencing packets properly is a critical step in launching a successful TCP-based session<br />

hijacking. Referring back to Chapter 9, recall that there is a logistical challenge in sniffing<br />

traffic from other networks or collision domains. This is because each switchport is an<br />

isolated collision domain. An attacker attempting to perform a session hijack attack on<br />

a victim machine outside the attacker’s network or network segment creates a challenge<br />

similar to the one you faced in sniffing traffic in Chapter 9. The attacker will be going in<br />

“blind” because they will not be able to receive a return traffic confirmation of success.<br />

<strong>Hacker</strong> on the Run<br />

The infamous hacking saga of Kevin Mitnick is always a good read for ethical hackers as<br />

well as Tom Clancy fans. Mr. Mitnick’s hacking activities finally landed him in prison in<br />

1995, but the events leading up to the arrest read like a suspense novel. The noteworthy<br />

portion of the story is the fact that Mitnick used IP spoofing and a form of TCP session<br />

hijacking to gain access to the resources that inevitably landed him in hot water. This is

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!