Jump to content

Talk:TCP sequence prediction attack

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is the current revision of this page, as edited by Sohardtohavename (talk | contribs) at 22:04, 10 March 2024 (What about faking socket number). The present address (URL) is a permanent link to this version.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

What about faking port number

[edit]

If I understand correctly to fake a TCP packet the attacker needs both the IP address and port number to be the same as the faked host, and then deals with sequence numbers. The same IP address is easy with NAT, but NAT does not allow the same port number for different hosts. Otherwise it cannot tell the packet is to which host. How does this fake both IP and socket number? Or does it have to be done by those controlling the routers Sohardtohavename (talk) 20:51, 10 March 2024 (UTC)[reply]