Security Basics mailing list archives
Re: TCP vs UDP II
From: Donnie Tognazzini <don_tog () yahoo com>
Date: Sat, 16 Nov 2002 23:17:13 -0800 (PST)
Please do a google on "TCP Hijacking".. very possible.. not very easy.. but applications like "hunt" ( for the script kiddies ) exist.. --- Pablo Gietz <pablo.gietz () nuevobersa com ar> wrote:
Dear list: It's possible that a intruder could take active part of a TCP connection after this was established? In UPD I know this is true because is a connectionless protocol. But I have doubts about TCP. Thanks Pablo A. C. Gietz Jefe de Seguridad Informática Nuevo Banco de Entre Ríos S.A. Te.: 0343 - 4201351
__________________________________________________ Do you Yahoo!? Yahoo! Web Hosting - Let the expert host your site http://webhosting.yahoo.com
Current thread:
- TCP vs UDP II Pablo Gietz (Nov 13)
- Re: TCP vs UDP II Rooster (Nov 14)
- Re: TCP vs UDP II Steve Bremer (Nov 14)
- Contractors on Company Networks - Network segregation William Kupersanin (Nov 17)
- RE: Contractors on Company Networks - Network segregation Bill Lavalette (Nov 18)
- Contractors on Company Networks - Network segregation William Kupersanin (Nov 17)
- Re: TCP vs UDP II Alevizos Dimos (Nov 15)
- Re: TCP vs UDP II Donnie Tognazzini (Nov 18)
- <Possible follow-ups>
- RE: TCP vs UDP II Schouten, Diederik (Diederik) (Nov 14)
- RE: TCP vs UDP II Garbrecht, Frederick (Nov 14)
- RE: TCP vs UDP II charles lindsay (Nov 15)