![]() |
От: |
Sharov
|
|
Дата: | 04.07.19 10:52 | ||
Оценка: |
Spoofing. If we want to “break-in” to an ongoing TCP connection, and
pretend to be one of the end-hosts, we need to send an sequence number that will
convince the other end that we are legitimate. For example, imagine that a source host, A,
tries to create a TCP connection with host B. When host A sends the SYN message, host
C (masquerading as B) sends a SYN+ACK message to host A with the correct sequence
number. Even though C didn’t see the original SYN message, it gets lucky and guesses
the right sequence number to send back so as to fool host A.