{"guid":"import-e0dc3d63d8c85c7c2f","title":"Network Hijacking","subtitle":null,"slug":"19C3-401-network-hijacking","link":"http://www.ccc.de/congress/2002/fahrplan/event/401.en.html","description":"Neben den Grundlagen von TCP-Hijacking werden u.a. Hijacking in geswitchten Umgebungen mit ARP-Spoofing /-Relaying sowie ICMP-Redirection besprochen.\n\nAls Exkurs wird dieses Jahr das Thema \"Social-Hijacking\" angeschnitten.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":131,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-17T19:45:06.665+01:00","length":3332,"duration":3332,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-401-network-hijacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-401-network-hijacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-e0dc3d63d8c85c7c2f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-e0dc3d63d8c85c7c2f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-401-network-hijacking","url":"https://api.media.ccc.de/public/events/import-e0dc3d63d8c85c7c2f","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":4},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":4},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":2},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":2}],"recordings":[{"size":null,"length":3325,"mime_type":"video/mp4","language":"eng","filename":"19C3-401-network-hijacking.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":320,"height":240,"updated_at":"2016-01-27T11:03:10.916+01:00","recording_url":"https://cdn.media.ccc.de/congress/2002/mp4/19C3-401-network-hijacking.mp4","url":"https://api.media.ccc.de/public/recordings/3866","event_url":"https://api.media.ccc.de/public/events/import-e0dc3d63d8c85c7c2f","conference_url":"https://api.media.ccc.de/public/conferences/19c3"},{"size":null,"length":3332,"mime_type":"audio/mpeg","language":"eng","filename":"19C3-401-network-hijacking.mp3","state":"downloaded","folder":"lectures","high_quality":true,"width":null,"height":null,"updated_at":"2014-06-29T00:22:28.869+02:00","recording_url":"https://cdn.media.ccc.de/congress/2002/lectures/19C3-401-network-hijacking.mp3","url":"https://api.media.ccc.de/public/recordings/3918","event_url":"https://api.media.ccc.de/public/events/import-e0dc3d63d8c85c7c2f","conference_url":"https://api.media.ccc.de/public/conferences/19c3"}]}