Hijacking

from Wikipedia, the free encyclopedia
Hijacking hotspot in South Africa

Hijacking ( Engl. Hijacking ) refers to a violent takeover, kidnapping or robbery. The term originally refers primarily to aircraft hijacking or the theft of a vehicle under threat of violence (see carjacking ). At the moment, hijacking is particularly popular in connection with the Internet .

Internet hijacking

In the parlance of the Internet , hijacking refers to the takeover of an Internet domain or the contents of a domain or a user account (e.g. mail , eBay , Amazon , Facebook, etc.). In the case of a more or less legal takeover of a domain name, this is also known as domain grabbing . If the content is changed by hacking techniques, one also speaks of defacement .

The following selection shows which processes fall under the term:

  • Domain Name Hijacking - Attempting to get the name of an Internet domain through legal action or similar legal action
  • DNS hijacking - deliberately wrong answers to DNS queries
  • Network hijacking - takeover of a poorly protected server in the Internet or in a WLAN , in which the actual owner of the server is often locked out
  • Typing-error-hijacking or type-writing-hijacking - attempt to lure users to a website by using similar or typographical names from a well-known website
  • Browser hijacking - A malicious program changes the start page or search page of a browser to a page that the user does not want.
  • Search engine hijacking - referring to a URL in the HTTP header . It is linked dynamically to pages. The code 302 signals to the browser that the content has been moved to a different URL. However, due to a bug in the Google search engine, this led to the linked pages being removed from the index.
  • TCP hijacking - Successful takeover or interruption of a TCP connection by guessing the acknowledgment number following a sequence number . Often, spoofing techniques are used at the same time to take over the connection. The sender is diverted to a wrong target or to the actual target, but via the attacker's computer as the intermediary for the connection ( man-in-the-middle attack ).
  • History hijacking - Successful takeover of the browser history: A known security gap enables site operators to spy on the previous surfing behavior of their visitors. Third parties can also use history stealing to place appropriate code on pages and collect information on a large scale.

Further examples are session hijacking or DLL hijacking .

Web links

Commons : Hijacking  - collection of images, videos and audio files

Individual evidence

  1. Konrad Lischka: IT researcher: This is how easily criminals can sniff out web surfers. In: Spiegel Online . December 6, 2010.