Security Basics mailing list archives
RE: TCP vs UDP II
From: "Garbrecht, Frederick" <FGarbrecht () ecogchair org>
Date: Wed, 13 Nov 2002 15:23:53 -0500
Yes, it's certainly possible. This is what 'man-in-the-middle' attacks are all about. Check this out for a nice explanation: http://rr.sans.org/threats/middle.php Best, Fred -----Original Message----- From: Pablo Gietz [mailto:pablo.gietz () nuevobersa com ar] Sent: Wednesday, November 13, 2002 11:56 AM To: security-basics () securityfocus com Subject: TCP vs UDP II Dear list: It's possible that a intruder could take active part of a TCP connection after this was established? In UPD I know this is true because is a connectionless protocol. But I have doubts about TCP. Thanks Pablo A. C. Gietz Jefe de Seguridad Informática Nuevo Banco de Entre Ríos S.A. Te.: 0343 - 4201351
Current thread:
- TCP vs UDP II Pablo Gietz (Nov 13)
- Re: TCP vs UDP II Rooster (Nov 14)
- Re: TCP vs UDP II Steve Bremer (Nov 14)
- Contractors on Company Networks - Network segregation William Kupersanin (Nov 17)
- RE: Contractors on Company Networks - Network segregation Bill Lavalette (Nov 18)
- Contractors on Company Networks - Network segregation William Kupersanin (Nov 17)
- Re: TCP vs UDP II Alevizos Dimos (Nov 15)
- Re: TCP vs UDP II Donnie Tognazzini (Nov 18)
- <Possible follow-ups>
- RE: TCP vs UDP II Schouten, Diederik (Diederik) (Nov 14)
- RE: TCP vs UDP II Garbrecht, Frederick (Nov 14)
- RE: TCP vs UDP II charles lindsay (Nov 15)