Virus Websites Hacked And Defaced By Anonymous Palestine
If source-routing is turned off, the hacker can use “blind” hijacking, whereby it guesses the responses of the two machines.
Thus, the hacker can send a command, but can by no means see the response. However, a typical command would be to set a password permitting access from some place else on the net.