Figure 39 Poor Attacker Position for TCP Spoofing Attack

Altacfcer

In this attack scenario, the adversary attempts to appear like a trusted client by interjecting into the conversation after the true client has authenticated. This sort of attack is very difficult if the attacker is unable to see the packets exchanged between client and server.

TCP spoofing becomes much more damaging when launched from a location along the path between the true client and the server. A topology for such an attack is shown in Figure 3-10.

Figure 3-10. Ideal Attacker Position for TCP Spoofing Attack

Figure 3-10. Ideal Attacker Position for TCP Spoofing Attack

Attacker

Here the attacker sees all the information necessary to launch this attack. Identity Spoofing

Table 3-14 shows the summary information for the identity spoofing attack.

100 SEO Tips

100 SEO Tips

100 SEO Tips EVERY SEO Enthusiast Should Know. This Report 100 SEO Tips will help you to Utilize These Tips to Dominate The Search Engine Today.

Get My Free Ebook


Post a comment