control hijacking
Control hijacking refers to a malicious process where an attacker gains unauthorized control over a computer system or program and redirects it to behave in a way that suits their objectives, thereby compromising the intended functionality and allowing the attacker to execute arbitrary commands.
Requires login.
Related Concepts (22)
- buffer overflow attacks
- code injection
- code pointer hijacking
- code reuse attacks
- control flow hijacking
- control-data attack (cda)
- data-oriented programming (dop)
- format string attacks
- format string vulnerabilities
- function pointer hijacking
- global offset table (got) overwrite
- heap overflow
- just-in-time spraying (jit spraying)
- pointer subterfuge
- return-oriented analysis (roa)
- return-oriented programming (rop)
- return-to-libc attacks
- shellcode injection
- stack corruption
- stack overflow
- stack smashing
- use-after-free vulnerability
Similar Concepts
- command and control
- control and manipulation
- control freak
- control hijacking prevention
- control issues
- control methods
- control problem
- control problem in autonomous vehicles
- control problem in computer security
- control structures
- control-data attack
- control-flow hijacking
- control-flow hijacking and code reuse attacks
- control-flow hijacking detection
- control-flow hijacking mitigations