Firewall Wizards mailing list archives
Re: Session hijacking, source-routes
From: Ken Hardy <ken () bridge com>
Date: Wed, 10 Feb 1999 15:03:42 -0600 (CST)
Okay, it should have been apparent that if you can see the packets before the hijack, they don't need to be routed to you after the hijack. Anyway, how big is the threat in the real world? I'd love to hear some war stories. Does anyone on this list have any experience with an actual attack involving a hijacked session, or is it all in the laboratory? -- KH
Current thread:
- Session hijacking, source-routes Ken Hardy (Feb 10)
- Re: Session hijacking, source-routes Bennett Todd (Feb 10)
- Re: Session hijacking, source-routes Paul D. Robertson (Feb 10)
- Re: Session hijacking, source-routes Ken Hardy (Feb 11)
- Re: Session hijacking, source-routes Cohen Liota (Feb 11)
- <Possible follow-ups>
- Re: Session hijacking, source-routes Ryan Russell (Feb 10)