Say you have a TCP session between point A and B, and a hacker is on point C, which is not in the path of A and B, I've heard it is possible for C to hijack A's packets when connecting to B and say, sending a password to login to a forum.
The way I was explained was that if you hammer A on an open port, the OS will get confused and start sending packets to the wrong host. I can't figure out how this would be possible as this all happens at a rather low layer and is contained withing a TCP session. If anything the packets will just get dropped.
How is this possible? This is basically what the hackers who can crack SSL do though I heard they also use a network called thor, which still, can't see how it would grab data from an outside path.
I'm not network/security expert but I know the basics of how stuff works, and the fact that this is possible really has me stumped. I thought the only way to sniff packets was to physically have access to the network path the packets are taking, or have something installed on a remote machine that is in that path.
The way I was explained was that if you hammer A on an open port, the OS will get confused and start sending packets to the wrong host. I can't figure out how this would be possible as this all happens at a rather low layer and is contained withing a TCP session. If anything the packets will just get dropped.
How is this possible? This is basically what the hackers who can crack SSL do though I heard they also use a network called thor, which still, can't see how it would grab data from an outside path.
I'm not network/security expert but I know the basics of how stuff works, and the fact that this is possible really has me stumped. I thought the only way to sniff packets was to physically have access to the network path the packets are taking, or have something installed on a remote machine that is in that path.