In message <Pine.GSO.4.31.0103121911520.9269-100000 at meron.openu.ac.il>, Rafi Sa dowsky writes: > > Hi > > Is there anything actually new in this exploit compared to the known TCP >hijacking vulnerabilities as portrayed say in Phrack 50(Juggernaut) ? Juggernaut requires eavesdropping; this one doesn't. --Steve Bellovin, http://www.research.att.com/~smb