This practice test covers Domain 4 (Network and Perimeter Hacking) Subdomain 4 (Session Hijacking) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 4.4 Practice Test 002
10 questions • 8 single-answer, 2 multi-select
Question 1
A penetration tester assessing a retail web application discovers that the application generates session tokens using a predictable algorithm based on the username concatenated with a Unix timestamp. The tester can compute valid session tokens for other authenticated users and impersonate them without knowing their passwords. Which session hijacking technique is the tester exploiting?
    Question 2
    Clark is conducting a black-box web application assessment and injects a malicious JavaScript payload into a vulnerable comment field that reads document.cookie and transmits the value to an external server he controls. Once a victim administrator logs in and views the page, Clark receives the admin's session cookie in his collection server's log and uses it to authenticate as the admin. Which attack type did Clark perform?
      Question 3
      Select all that apply
      A security analyst is demonstrating network-level session hijacking during an enterprise red team exercise on a flat, unsegmented LAN where ARP-based traffic interception is feasible. The analyst needs to capture and replay valid TCP session tokens traversing the wire to illustrate the risk to the security team. Which TWO tools would be MOST appropriate for capturing and exploiting active network-level sessions in this scenario? (Choose two)
        Question 4
        Elijah discovers that a banking web application does not regenerate the session ID upon successful authentication, allowing a pre-authentication session token to remain valid post-login. He tricks a victim into clicking a crafted URL that pre-sets a known session ID, then waits for the victim to authenticate before using that same session ID to access the victim's account. Which attack technique did Elijah execute?
          Question 5
          During a wireless security assessment at a coffee shop, a security analyst positions herself on the open Wi-Fi network and uses Ferret to sniff traffic and Hamster to replay captured cookies, successfully intercepting HTTP session tokens transmitted by a nearby user's browser. She replays the captured cookies in her own browser and gains full access to the victim's webmail account without knowing the user's password. Which session hijacking technique is being demonstrated?
            Question 6
            A cloud-based SaaS application's development team is reviewing their session management implementation after a penetration test revealed that session cookies were accessible via JavaScript and were transmitted over both HTTP and HTTPS connections. The security team wants to implement two cookie attributes that prevent client-side script access to the cookie and ensure it is only sent over encrypted connections. Which combination of cookie attributes should the team configure?
              Question 7
              Jane is performing an advanced red team exercise on an internal corporate network where she intercepts a Telnet session between a system administrator and a legacy router using Ettercap to perform ARP poisoning and become the man-in-the-middle. She analyzes the TCP sequence and acknowledgment numbers of the ongoing session and injects crafted packets with the correct sequence numbers to send unauthorized commands to the legacy router. Which type of session hijacking is Jane performing?
                Question 8
                Select all that apply
                An enterprise security architect is reviewing countermeasures to prevent session hijacking attacks against the organization's internal web applications after a red team successfully hijacked multiple admin sessions using both network sniffing and XSS techniques. The architect wants to implement controls that protect session tokens both in transit and against client-side JavaScript theft while also limiting the exposure window of any compromised token. Which TWO countermeasures would MOST effectively reduce session hijacking risk in this environment? (Choose two)
                  Question 9
                  A web application penetration tester uses Burp Suite's Sequencer tool to analyze the randomness of session tokens issued by a healthcare portal that stores sensitive patient records. The Sequencer captures thousands of tokens and performs statistical entropy analysis, revealing that the tokens contain only 32 bits of effective entropy instead of the recommended 128 bits. Which attack is this low entropy level MOST likely to facilitate?
                    Question 10
                    A threat actor compromises a victim's workstation by installing a malicious browser extension that hooks into the browser process, monitoring all HTTP requests and responses to automatically extract session tokens and authentication cookies as the victim browses their online banking portal. Unlike traditional network sniffing, this attack intercepts data within the browser process after TLS decryption has already occurred, rendering HTTPS and certificate pinning ineffective as defenses. Which session hijacking technique does this represent?

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *