Home page logo
/

basics logo Security Basics mailing list archives

Re: TCP vs UDP II
From: Donnie Tognazzini <don_tog () yahoo com>
Date: Sat, 16 Nov 2002 23:17:13 -0800 (PST)

Please do a google on "TCP Hijacking".. very
possible.. not very easy.. but applications like
"hunt" ( for the script kiddies ) exist.. 


--- Pablo Gietz <pablo.gietz () nuevobersa com ar> wrote:
Dear list:
It's possible that a intruder could take active part
of a TCP connection
after this was established?
In UPD I know this is true because is a
connectionless protocol. But I have
doubts about TCP.
Thanks

Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351




__________________________________________________
Do you Yahoo!?
Yahoo! Web Hosting - Let the expert host your site
http://webhosting.yahoo.com


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault