mailing list archives
RE: TCP vs UDP II
From: "Schouten, Diederik (Diederik)" <dschout () lucent com>
Date: Wed, 13 Nov 2002 21:18:57 +0100
It's possible that a intruder could take active part of a TCP
connection after this was established?
In UPD I know this is true because is a connectionless
protocol. But I have doubts about TCP.
Depending on the location of the attacker this would indeed be possible.
He/She's either needs to be able to trace the connection or be able to guess
values like port numbers, fragment ID's, timestamps etc.
But it is definitly possible.