Security Basics mailing list archives

TCP vs UDP II


From: "Pablo Gietz" <pablo.gietz () nuevobersa com ar>
Date: Wed, 13 Nov 2002 13:55:31 -0300

Dear list:
It's possible that a intruder could take active part of a TCP connection
after this was established?
In UPD I know this is true because is a connectionless protocol. But I have
doubts about TCP.
Thanks

Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351



Current thread: