"Snarfing"
Not sure if this is the correct term, but I've heard it several times of
late. It seems to refer to the ability to take control of a session from
someone else and essentially spoof their identity.
How do "attackers" monitor these sessions and what tools do they use to
monitor and take control?
Is this "attack" a danger only to certain protocols?
What are the defenses against this attack?
Any discussion is appreciated.
Ben
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]