Hijacking

Hijacking (English hijacking ) denotes a violent takeover, kidnapping or robbery. The term originally refers primarily to aircraft hijacking or theft of a vehicle under the threat of violence (see carjacking ). Currently, is spoken mainly in the context of the Internet of hijacking.

Hijacking the web

In the language of the Internet hijacking refers to the acquisition of an Internet domain or the contents of a domain or user account ( such as Mail, eBay, Amazon, Facebook, etc.). In case of more or less legal acquisition of a domain name, this is also referred to as domain grabbing. If the content changed by hacking techniques, one also speaks of defacement.

The following selection shows which operations fall specifically under the term:

  • Domain Name Hijacking - trying to get the name of an Internet domain by lawsuit or similar legal measures
  • DNS hijacking - willfully false answers to DNS queries
  • Network Hijacking - acquisition of a poorly protected server on the Internet or on a wireless network, thereby the actual owner of the server is often locked out
  • Typing error hijacking, or type -writing hijacking - attempt to lure users to a Web page by similar or resulting by typo name of a very well known website are used
  • Browser Hijacking - Change the home page or search page from a browser on a not desired by the user page by a malicious program.
  • Search Engine Hijacking - Linking to a URL via headers instructions of the HTTP header. It is not normal, but dynamically linked to pages. The code 302 indicates to the browser that the content is moved to a different URL. This, however, led by a bug in the Google search engine mean that the sites were removed from the index.
  • TCP Hijacking - Successful acquisition or interruption of a TCP connection by guessing the following on a sequence Number Acknowledgmentnumber. Often at the same time spoofing techniques are used to accept the connection. The sender is thereby diverted to the wrong destination, or indeed of the ultimate goal, but on the computer of the attacker as an intermediary compound ( man-in- the-middle attack).
  • History hijacking - Successful acquisition of the browser history: A security vulnerability is site operators allows to spy on the previous surfing behavior of its visitors. Likewise, third parties can place on sides and collect information on a large scale by History Stealing appropriate code.

Other examples are session hijacking or DLL hijacking.

391889
de