1 | Allows an attacker to steal, share, terminate, monitor and log any terminal session that is in progress |
2 | Session stolen across the network |
3 | bypass all forms of strong authentication |
4 | HUNT, session hijacking tool written in November 1998: http://www.rootshell.com allows insertion of commands or takeover of session |
5 | What can be hijacked: telnet, rlogin, rsh, ftp |