Talk:TCP sequence prediction attack
Appearance
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||
|
What about faking port number
[edit]If I understand correctly to fake a TCP packet the attacker needs both the IP address and port number to be the same as the faked host, and then deals with sequence numbers. The same IP address is easy with NAT, but NAT does not allow the same port number for different hosts. Otherwise it cannot tell the packet is to which host. How does this fake both IP and socket number? Or does it have to be done by those controlling the routers Sohardtohavename (talk) 20:51, 10 March 2024 (UTC)
Categories:
- Start-Class Computing articles
- Low-importance Computing articles
- Start-Class Computer networking articles
- Low-importance Computer networking articles
- Start-Class Computer networking articles of Low-importance
- All Computer networking articles
- All Computing articles
- Start-Class Internet articles
- Unknown-importance Internet articles
- WikiProject Internet articles