Home page logo
/

basics logo Security Basics mailing list archives

RE: TCP vs UDP II
From: "Garbrecht, Frederick" <FGarbrecht () ecogchair org>
Date: Wed, 13 Nov 2002 15:23:53 -0500

Yes, it's certainly possible.  This is what 'man-in-the-middle' attacks are
all about.  Check this out for a nice explanation:
http://rr.sans.org/threats/middle.php

Best,

Fred

-----Original Message-----
From: Pablo Gietz [mailto:pablo.gietz () nuevobersa com ar]
Sent: Wednesday, November 13, 2002 11:56 AM
To: security-basics () securityfocus com
Subject: TCP vs UDP II


Dear list:
It's possible that a intruder could take active part of a TCP connection
after this was established?
In UPD I know this is true because is a connectionless protocol. But I have
doubts about TCP.
Thanks

Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]