"Snarfing"

Not sure if this is the correct term, but I've heard it several times of
late.  It seems to refer to the ability to take control of a session from
someone else and essentially spoof their identity.

How do "attackers" monitor these sessions and what tools do they use to
monitor and take control?

Is this "attack" a danger only to certain protocols?

What are the defenses against this attack?

Any discussion is appreciated.

Ben

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to