Home page logo
/

basics logo Security Basics mailing list archives

RE: TCP vs UDP II
From: "Schouten, Diederik (Diederik)" <dschout () lucent com>
Date: Wed, 13 Nov 2002 21:18:57 +0100

Dear list:
It's possible that a intruder could take active part of a TCP 
connection after this was established?
In UPD I know this is true because is a connectionless 
protocol. But I have doubts about TCP.

Depending on the location of the attacker this would indeed be possible.

He/She's either needs to be able to trace the connection or be able to guess
values like port numbers, fragment ID's, timestamps etc.

But it is definitly possible.

Greetings,

        Diederik


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]