Home page logo
/

basics logo Security Basics mailing list archives

TCP vs UDP II
From: "Pablo Gietz" <pablo.gietz () nuevobersa com ar>
Date: Wed, 13 Nov 2002 13:55:31 -0300

Dear list:
It's possible that a intruder could take active part of a TCP connection
after this was established?
In UPD I know this is true because is a connectionless protocol. But I have
doubts about TCP.
Thanks

Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351



  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]