Most modern TCP implementations use pseudo-random number generators (PRNG) to determine starting sequence numbers for TCP sessions. With such generators, it is difficult to compute the ith number generated, given only the (i - 1)st number generated. Explain what network security risks are created if an attacker is able to break such a PRNG so that he can in fact easily compute the ith number
generated, given only the (i - 1)st number generated.
What will be an ideal response?
First, the attacker initiates a TCP connection to the server to get a sequence
number generated by the server. Next, the attacker performs a session-spoofing blind
injection attack on a victim and the server by predicting the next TCP sequence number
generated by the PRNG.
Computer Science & Information Technology
You might also like to view...
________ misplacement can result in physical injuries such as carpal tunnel syndrome and tendonitis
Fill in the blank(s) with correct word
Computer Science & Information Technology
The Start menu includes the:
A) feeds B) spin box C) programs list D) wallpaper
Computer Science & Information Technology