Active Attacks
IP spoofing.
Session hijacking possible with canned programs.
Requires eavesdropping ability.
Canned programs seem to be avaible.
Cryptographic stunts.
None yet, but...
Previous slide
Next slide
Back to first slide
View graphic version