mailing list archives
Re: TCP vs UDP II
From: "Steve Bremer" <steveb () nebcoinc com>
Date: Wed, 13 Nov 2002 14:27:34 -0600
It's possible that a intruder could take active part of a TCP
connection after this was established?
Yes, but there are limitations. A good, random ISN is very
Do a google search on TCP session hijacking and you'll probably
find more than you'll ever want to know about it.