TCP/IP Hijacking is done when a genuine network connection of a another user can be accessed by an authorized user. To bypass the password authentication, TCP/IP Hijacking id usually done.
A TCP/IP connection is established as shown below −
To hijack TCP/IP connection, there are two possibilities −
1. Shijack :
Shijack is one of the best TCP/IP hijack tools. Python language is used to develop this tool.
An example of a Shijack command is −
root:/home/root/hijack# ./shijack eth0 192.168.0.100 53517 192.168.0.200 23
Shijack Here, we are trying to hijack a Telnet connection between the two hosts.
2. Hunt :
Hunt is another popular tool used to hijack a TCP/IP connection.
All the sessions which are unencrypted are susceptible to TCPIP hijacking. Hence encrypted protocols need to be used or sessions to be kept secured by using double authentication techniques.
All Rights Reserved. © 2023 BookOfNetwork