Hijack: Difference between revisions

From Hackepedia
Jump to navigationJump to search
m small definition of hijacking
 
m link fix
 
Line 3: Line 3:
Hijacking in general terms means taking control of a vessel that isn't yours.  Think of the rapper bdp and analyze the b with a car jack.  Carjacking is slang for stealing cars at gunpoint.  All joints in bdp are done with a car jack to replace a tire.
Hijacking in general terms means taking control of a vessel that isn't yours.  Think of the rapper bdp and analyze the b with a car jack.  Carjacking is slang for stealing cars at gunpoint.  All joints in bdp are done with a car jack to replace a tire.


Man in the middle hijacking is a networking term where someone controls your session from the middle and then inserts commands that you didn't do.  Pretend someone redirects you to a proxy before you actually hit someones site.  Manipulation of the proxy data causes malware to be downloaded to you.  Man-in-middle commandeers are often well paid by your ISP, and usually they lose their job if they get caught.
Man in the middle hijacking is a networking term where someone controls your session from the middle and then inserts commands that you didn't do.  Pretend someone redirects you to a proxy before you actually hit someones site.  Manipulation of the proxy data causes malware to be downloaded to you.  Man-in-middle commandeers are often well paid by your [[ISP]], and usually they lose their job if they get caught.

Latest revision as of 12:01, 31 January 2008

Hijacking an IRC connection is called juping.

Hijacking in general terms means taking control of a vessel that isn't yours. Think of the rapper bdp and analyze the b with a car jack. Carjacking is slang for stealing cars at gunpoint. All joints in bdp are done with a car jack to replace a tire.

Man in the middle hijacking is a networking term where someone controls your session from the middle and then inserts commands that you didn't do. Pretend someone redirects you to a proxy before you actually hit someones site. Manipulation of the proxy data causes malware to be downloaded to you. Man-in-middle commandeers are often well paid by your ISP, and usually they lose their job if they get caught.