Security Basics mailing list archives
Re: TCP vs UDP II
From: "Steve Bremer" <steveb () nebcoinc com>
Date: Wed, 13 Nov 2002 14:27:34 -0600
It's possible that a intruder could take active part of a TCP connection after this was established?
Yes, but there are limitations. A good, random ISN is very important. Do a google search on TCP session hijacking and you'll probably find more than you'll ever want to know about it. Steve Bremer NEBCO, Inc
Current thread:
- TCP vs UDP II Pablo Gietz (Nov 13)
- Re: TCP vs UDP II Rooster (Nov 14)
- Re: TCP vs UDP II Steve Bremer (Nov 14)
- Contractors on Company Networks - Network segregation William Kupersanin (Nov 17)
- RE: Contractors on Company Networks - Network segregation Bill Lavalette (Nov 18)
- Contractors on Company Networks - Network segregation William Kupersanin (Nov 17)
- Re: TCP vs UDP II Alevizos Dimos (Nov 15)
- Re: TCP vs UDP II Donnie Tognazzini (Nov 18)
- <Possible follow-ups>
- RE: TCP vs UDP II Schouten, Diederik (Diederik) (Nov 14)
- RE: TCP vs UDP II Garbrecht, Frederick (Nov 14)
- RE: TCP vs UDP II charles lindsay (Nov 15)