Student Reviews
( 5 Of 5 )
1 review
Video of Session ID Hijacking With Python OverTheWire Natas 18-19 in Web PenTesting course by Motasem Hamdan Cyber Security & Tech channel, video No. 4 free certified online
In this video-walkthrough, we covered OverTheWire Natas 19-20 level. This level was similar to the previous level but with the session ID no longer generated sequentially and in the new challenge, the session ID is generated using a range of numbers from 1 to 640 and then combined with the username used to login and lastly the final string is hex encoded. Using python scripting were able to identify the pattern used in creating the session ID and find the one associated with the admin account.
Writeup
https://motasem-notes.net/session-id-hijacking-with-python-overthewire-natas-19-20/
OverTheWire Natas Level 18-19
https://overthewire.org/wargames/natas/natas19.html
Patreon
https://www.patreon.com/motasemhamdan?fan_landingtrue
Instagram
https://www.instagram.com/dev.stuxnet/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Website
https://www.motasem-notes.net
Backup channel
https://www.youtube.com/channel/UCF2AfcPUjr7r8cYuMvyRTTQ
My Movie channel:
https://www.youtube.com/channel/UCilElKPoXEaAfMf0bgH2pzA