Boost your skills for the Ethical Hacking Test. Explore diverse questions, insightful tips, and detailed explanations. Prepare effectively for your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which sequence of steps is correct for session hijacking performed by a hacker?

  1. 1 -> 2 -> 3 -> 4 -> 5

  2. 4 -> 2 -> 1 -> 3 -> 5

  3. 2 -> 3 -> 4 -> 1 -> 5

  4. 3 -> 4 -> 1 -> 2 -> 5

The correct answer is: 4 -> 2 -> 1 -> 3 -> 5

Session hijacking is a technique where an attacker takes over a user session after the user has authenticated. The correct sequence of steps typically involves reconnaissance, capturing session tokens, taking control of the session, and then exploiting the access gained. The selected sequence begins with taking control of the session, which is crucial as it allows the attacker to access the resources that the authenticated user is permitted to use. Following that, identifying session cookies comes next, which is essential for gaining the necessary information to maintain control over the session. After that, establishing a new connection is significant as it allows the attacker to mimic the user’s actions transparently while using the stolen session token. Finally, performing actions on behalf of the user completes the process of session hijacking, as the attacker can now utilize the session to achieve their goals without arousing suspicion. The other sequences do not align as logically or realistically with the required steps to execute session hijacking, making this choice the most coherent and systematic in terms of the underlying process involved.