mailing list archives
RE: TCP vs UDP II
From: "Garbrecht, Frederick" <FGarbrecht () ecogchair org>
Date: Wed, 13 Nov 2002 15:23:53 -0500
Yes, it's certainly possible. This is what 'man-in-the-middle' attacks are
all about. Check this out for a nice explanation:
From: Pablo Gietz [mailto:pablo.gietz () nuevobersa com ar]
Sent: Wednesday, November 13, 2002 11:56 AM
To: security-basics () securityfocus com
Subject: TCP vs UDP II
It's possible that a intruder could take active part of a TCP connection
after this was established?
In UPD I know this is true because is a connectionless protocol. But I have
doubts about TCP.
Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351