TCP is a very important protocol on Internet. More than half of the traffic in Internet uses TCP. When it comes to services which require QoS (quality of service) TCP plays a major role whether it be logging into Facebook or opening a website like Wikipedia.com the underlying protocol which takes care of “reliable” service is TCP. TCP’s dominance over internet has its advantages and disadvantages. The architecture of TCP/IP protocol suit doesn’t have any security features, what it has is algorithms for protocol timers, logics, buffering, mapping, management but there is nothing in code for its security. As Internet evolved the techniques to use it un-ethically also evolved. These techniques are nothing but exploitations of vulnerabilities in the protocol architectures. TCP being the major protocol used in internet, many hacking applications were developed which bypasses its ethical usage (we will study those tools in upcoming posts) so what are those vulnerabilities in TCP ? before we start let us have a brief look at a TCP packet structure.
I have moved all my WordPress blogs to a single blog at Blogger, the complete article can be found at the below link
I would be deleting all of my WordPress blogs soon, http://bvkmohan.blogspot.in/ is my only blog, you can find all my stuff there 🙂
Thank you for visiting and sorry for the inconvenience. See you there!