T 5.89 Hijacking of network connections
Hijacking a connection is far more critical than intercepting a connection. Here, packets are implanted into the network either causing the client to be cancelled or blocked. As a result, the server process is not able to discern that another program has taken the place of the original client. If an established connection is hijacked in this way, the attacker may perform any activities in the name of the authorised person upon successful authentication of an authorised person.
Example:
- There already is a host of programs which enable hijacking of an established Telnet connection.