Please do a google on "TCP Hijacking".. very possible.. not very easy.. but applications like "hunt" ( for the script kiddies ) exist..
--- Pablo Gietz <[EMAIL PROTECTED]> wrote: > Dear list: > It's possible that a intruder could take active part > of a TCP connection > after this was established? > In UPD I know this is true because is a > connectionless protocol. But I have > doubts about TCP. > Thanks > > Pablo A. C. Gietz > Jefe de Seguridad Inform�tica > Nuevo Banco de Entre R�os S.A. > Te.: 0343 - 4201351 > > __________________________________________________ Do you Yahoo!? Yahoo! Web Hosting - Let the expert host your site http://webhosting.yahoo.com
