≡ Menu

TCP Sequence Number Approximation Vulnerability

Though TCP protocol is a connection oriented and reliable protocol but still there a various loopholes that can be exploited. These loop holes are mostly explained in terms of attacks. In the previous article on the TCP/IP Attacks series, we explained about ARP Cache Poisoning. This article explains the following two attacks:  TCP sequence prediction [...]