Home page logo

basics logo Security Basics mailing list archives

From: Fuchs Bernhard <Bernhard.Fuchs () itellium com>
Date: Fri, 15 Nov 2002 15:47:05 +0100

yes! it is called "session hijacking" 
dsniff, hunt and so on....
these are tools 4 it

Mit freundlichen Grüßen/ sincerely yours

Bernhard Fuchs 
Junior System-Engineer 

Systems & Services GmbH 
Fürther Straße 205 
90429 Nürnberg 

Tel.:   +49-911-14-27321 
Fax:    +49-911-14-22016 
mailto:bernhard.fuchs () itellium com 

This email is confidential. If you are not the intended recipient, you must
not disclose or use the information contained in it. If you have received
this mail in error, please tell us immediately by return email and delete
the document. E-mails to and from the company are monitored for operational
reasons and in accordance with lawful business practices. The contents of
this email are those of the individual and do not necessarily represent the
views of the company. The company accepts no responsibility once an e-mail
and any attachments is sent. 

-----Ursprüngliche Nachricht-----
Von: Pablo Gietz [mailto:pablo.gietz () nuevobersa com ar]
Gesendet: Mittwoch, 13. November 2002 17:56
An: security-basics () securityfocus com
Betreff: TCP vs UDP II

Dear list:
It's possible that a intruder could take active part of a TCP connection
after this was established?
In UPD I know this is true because is a connectionless protocol. But I have
doubts about TCP.

Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351

  By Date           By Thread  

Current thread:
  • AW: TCP vs UDP II Fuchs Bernhard (Nov 16)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]