Welcome to DevilGroup - Carding Forum - Free Premium Accounts

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features such as download links. by joining our free
community you will have access to posts topics,communicate privately with other members (PM),respond to polls,upload content and access many other special features.
Registration is fast,simple and absolutely free so please,
 Click Sign up Button For Register 

- Advertisement Area -
For purchasing Ads contact ICQ : 623378515 
http://cloud-shack.com/ https://rescator.cm/
Sign in to follow this  
Mr Bomb

TCP/IP Hijacking

2 posts in this topic

TCP/IP Hijacking is when an authorized user gains access to a genuine network connection of another user. It is done in order to bypass the password authentication which is normally the start of a session.

In theory, a TCP/IP connection is established as shown below ***8722;

tcp_ip.jpg To hijack this connection, there are two possibilities ***8722;

 

  • Find the seq which is a number that increases by 1, but there is no chance to predict it.
  • The second possibility is to use the Man-in-the-Middle attack which, in simple words, is a type of network sniffing. For sniffing, we use tools like Wireshark or Ethercap.

Example

 

An attacker monitors the data transmission over a network and discovers the IP’s of two devices that participate in a connection.

When the hacker discovers the IP of one of the users, he can put down the connection of the other user by DoS attack and then resume communication by spoofing the IP of the disconnected user.

Shijack

 

In practice, one of the best TCP/IP hijack tools is Shijack. It is developed using Python language and you can download it from the following link ***8722; https://packetstormsecurity.com/sniffers/shijack.tgz

Here is an example of a Shijack command ***8722;

root:/home/root/hijack# ./shijack eth0 192.168.0.100 53517 192.168.0.200 23 shijack.jpg Here, we are trying to hijack a Telnet connection between the two hosts.

Hunt

 

Hunt is another popular tool that you can use to hijack a TCP/IP connection. It can be downloaded from ***8722; https://packetstormsecurity.com/sniffers/hunt/

hunt.jpg

Share this post


Link to post
Share on other sites

a thousand thanks for the explanation

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this