Yes, it's certainly possible. This is what 'man-in-the-middle' attacks are all about. Check this out for a nice explanation: http://rr.sans.org/threats/middle.php
Best, Fred -----Original Message----- From: Pablo Gietz [mailto:pablo.gietz@;nuevobersa.com.ar] Sent: Wednesday, November 13, 2002 11:56 AM To: [EMAIL PROTECTED] Subject: TCP vs UDP II Dear list: It's possible that a intruder could take active part of a TCP connection after this was established? In UPD I know this is true because is a connectionless protocol. But I have doubts about TCP. Thanks Pablo A. C. Gietz Jefe de Seguridad Inform�tica Nuevo Banco de Entre R�os S.A. Te.: 0343 - 4201351
