Please do a google on "TCP Hijacking".. very
possible.. not very easy.. but applications like
"hunt" ( for the script kiddies ) exist.. 


--- Pablo Gietz <[EMAIL PROTECTED]> wrote:
> Dear list:
> It's possible that a intruder could take active part
> of a TCP connection
> after this was established?
> In UPD I know this is true because is a
> connectionless protocol. But I have
> doubts about TCP.
> Thanks
> 
> Pablo A. C. Gietz
> Jefe de Seguridad Inform�tica
> Nuevo Banco de Entre R�os S.A.
> Te.: 0343 - 4201351
> 
> 


__________________________________________________
Do you Yahoo!?
Yahoo! Web Hosting - Let the expert host your site
http://webhosting.yahoo.com

Reply via email to