02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Understanding Session Hijacking 301<br />

8. Forwarding traffic isn’t a very eventful command, but it’s important to what you are trying<br />

to accomplish here. So now go back to your ping string and see what’s changed.<br />

9. Perfect; you can see that your ICMP packets are “normally” flowing across the wire<br />

without a hitch. You are now successfully in the middle of the victim’s traffic flow and<br />

are passing traffic along with no one the wiser. From here, you can steal the client session,<br />

perform a denial of service, or sniff passwords.<br />

At the risk of oversimplification, the exam is fairly straightforward when it<br />

comes to testing your knowledge of session hijacking and especially MITM<br />

attacks.<br />

UDP Session Hijacking<br />

UDP session hijacking is conceptually simpler than its TCP brethren because UDP doesn’t<br />

use sequencing for its packets. As you’ll recall, UDP is a connectionless protocol, meaning<br />

it doesn’t establish a verifiable connection between the client and the host. For an attacker,<br />

this means no packet sequence is needed. The aim of a UDP hijack is to fool the victim<br />

into thinking the attacker’s machine is the server. The attacker must try to get a response<br />

packet back to the client before the legitimate host, thereby assuming the role of the server.<br />

Different techniques can be used to intercept legitimate server traffic prior to its response to<br />

the victim, but the basic goal is the same.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!