Security Basics mailing list archives

Re: TCP vs UDP II


From: "Steve Bremer" <steveb () nebcoinc com>
Date: Wed, 13 Nov 2002 14:27:34 -0600

It's possible that a intruder could take active part of a TCP
connection after this was established?

Yes, but there are limitations.  A good, random ISN is very 
important.

Do a google search on TCP session hijacking and you'll probably 
find more than you'll ever want to know about it.

Steve Bremer
NEBCO, Inc


Current thread: