[759] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Hijacking tool

daemon@ATHENA.MIT.EDU (Timothy Newsham)
Wed Jan 25 06:13:28 1995

From: newsham@aloha.net (Timothy Newsham)
To: Quentin.Fennessy@SEMATECH.Org (Quentin Fennessy)
Date: Tue, 24 Jan 1995 22:10:57 -1000 (HST)
Cc: Alec.Muffett@UK.Sun.COM, bugtraq@fc.net
In-Reply-To: <199501241824.MAA11113@thecount.eng.sematech.org> from "Quentin Fennessy" at Jan 24, 95 12:23:22 pm

> Alec-
>     I think you may be confusing two techniques here - both of which
> have just become more 'popular.'  I believe the hijacking technique
> is to use TAP, a modloadable SunOS driver to read and possibly write
> to an established pty.

probably is confusing the two, but its a viable attack.. hijack
a tcp session that is already underway.  

> The TCP sequence number is what RTM and SMB wrote about.  This is
> different - you don't need root anywhere to to that.

You do need priveledged access to a machine to send out arbitrary
packets.  (Any mac or dos user is priveledged).

> Quentin


home help back first fref pref prev next nref lref last post