[prev in list] [next in list] [prev in thread] [next in thread] 

List:       firewalls-gc
Subject:    Re: Internet Firewall Vulnerabilities  Part 2 of 4
From:       Julian Assange <proff () suburbia ! net>
Date:       1995-11-26 15:42:50
[Download RAW message or body]

[...frankw@in.net...]
> TCP Sequence Number Prediction Attacks
> ======================================
> The TCP Sequence Number Prediction Attack (SNPA) relies on a somewhat
> similar technique where Bad Guy monitors the firewall traffic for a useful
> session 
> (telnet, ftp, etc.).  When the Bad Guy notices that Outside System A is 
> telneting in to Inside System C, the Bad Guy will wait until the user on A 
> has logged into Inside System C and then take over that session.  
[...]

You obviously have no real understanding of either the three-way handshake
sequence number prediction attack OR tcp splicing as you have some how managed
to merge the two together into something that isn't either of them.

The mind boggles at your manifest hypocrisy.

+----------------------------------+-----------------------------------------+
|Julian Assange                    | "if you think the United  States has    |
|FAX: +61-3-9819-9066              |  has stood still, who built the largest |
|EMAIL: proff@suburbia.net         |  shopping centre in the world?" - Nixon |
+----------------------------------+-----------------------------------------+

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic