Security Basics mailing list archives

AW: TCP vs UDP II


From: Fuchs Bernhard <Bernhard.Fuchs () itellium com>
Date: Fri, 15 Nov 2002 15:47:05 +0100

yes! it is called "session hijacking" 
dsniff, hunt and so on....
these are tools 4 it
check
http://www.owasp.org/asac/auth-session/hijack.shtml

Mit freundlichen Grüßen/ sincerely yours


Bernhard Fuchs 
Junior System-Engineer 
IT-Infrastruktur/IT-Sicherheit

ITELLIUM 
Systems & Services GmbH 
Fürther Straße 205 
90429 Nürnberg 

Tel.:   +49-911-14-27321 
Fax:    +49-911-14-22016 
mailto:bernhard.fuchs () itellium com 
http://www.itellium.com

This email is confidential. If you are not the intended recipient, you must
not disclose or use the information contained in it. If you have received
this mail in error, please tell us immediately by return email and delete
the document. E-mails to and from the company are monitored for operational
reasons and in accordance with lawful business practices. The contents of
this email are those of the individual and do not necessarily represent the
views of the company. The company accepts no responsibility once an e-mail
and any attachments is sent. 



-----Ursprüngliche Nachricht-----
Von: Pablo Gietz [mailto:pablo.gietz () nuevobersa com ar]
Gesendet: Mittwoch, 13. November 2002 17:56
An: security-basics () securityfocus com
Betreff: TCP vs UDP II


Dear list:
It's possible that a intruder could take active part of a TCP connection
after this was established?
In UPD I know this is true because is a connectionless protocol. But I have
doubts about TCP.
Thanks

Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351




Current thread: