19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.89 Hijacking of network connections<br />

Hijacking of a connection is even more serious than having a connection<br />

tapped. This entails injection of data packets into the network which result in<br />

either failure or blocking of the client. <strong>The</strong> server process is then unable to<br />

detect that a different program has now replaced the original client. When an<br />

existing connection is taken over in this way after a user has authenticated<br />

himself, the adversary can perform any actions he likes in the name of the<br />

authenticated person.<br />

Example<br />

<strong>The</strong>re are already a number of programs which allow an existing Telnet<br />

connection to be hijacked.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!