Home page logo
/

basics logo Security Basics mailing list archives

Re: TCP vs UDP II
From: "Steve Bremer" <steveb () nebcoinc com>
Date: Wed, 13 Nov 2002 14:27:34 -0600

It's possible that a intruder could take active part of a TCP
connection after this was established?

Yes, but there are limitations.  A good, random ISN is very 
important.

Do a google search on TCP session hijacking and you'll probably 
find more than you'll ever want to know about it.

Steve Bremer
NEBCO, Inc


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault