Security Basics mailing list archives
RE: TCP vs UDP II
From: "Schouten, Diederik (Diederik)" <dschout () lucent com>
Date: Wed, 13 Nov 2002 21:18:57 +0100
Dear list: It's possible that a intruder could take active part of a TCP connection after this was established? In UPD I know this is true because is a connectionless protocol. But I have doubts about TCP.
Depending on the location of the attacker this would indeed be possible. He/She's either needs to be able to trace the connection or be able to guess values like port numbers, fragment ID's, timestamps etc. But it is definitly possible. Greetings, Diederik
Current thread:
- TCP vs UDP II Pablo Gietz (Nov 13)
- Re: TCP vs UDP II Rooster (Nov 14)
- Re: TCP vs UDP II Steve Bremer (Nov 14)
- Contractors on Company Networks - Network segregation William Kupersanin (Nov 17)
- RE: Contractors on Company Networks - Network segregation Bill Lavalette (Nov 18)
- Contractors on Company Networks - Network segregation William Kupersanin (Nov 17)
- Re: TCP vs UDP II Alevizos Dimos (Nov 15)
- Re: TCP vs UDP II Donnie Tognazzini (Nov 18)
- <Possible follow-ups>
- RE: TCP vs UDP II Schouten, Diederik (Diederik) (Nov 14)
- RE: TCP vs UDP II Garbrecht, Frederick (Nov 14)
- RE: TCP vs UDP II charles lindsay (Nov 15)