Firewall Wizards mailing list archives

Re: Session hijacking, source-routes


From: Ken Hardy <ken () bridge com>
Date: Wed, 10 Feb 1999 15:03:42 -0600 (CST)

Okay, it should have been apparent that if you can see the
packets before the hijack, they don't need to be routed to you
after the hijack.

Anyway, how big is the threat in the real world?  I'd love to
hear some war stories.  Does anyone on this list have any
experience with an actual attack involving a hijacked session,
or is it all in the laboratory?

--
KH



Current thread: