Session Hijacking
CEH EXAM OBJECTIVES COVERED IN THIS
CHAPTER:
✓ I. Background
■ C. System technologies
✓ III. Security
■ A. Systems security controls
■ E. Network security
■ P. Vulnerabilities
✓ IV. Tools/Systems/Programs
■ G. TCP/IP networking
Chapter
12