• Breaking News

    Thursday, August 11, 2016

    Hackers to Hijack Internet Traffic and Inject Malware Remotely

    Today Seoexpertsforum.com/ is giving you most secret information that if you are using Internet, then it means you are not secure, and any time you will be attacked by some Hacker. In this regard,
    The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel) poses a serious threat to Internet users, whether or not they use Linux directly they have the same threat. This issue is troubling because Linux is used widely across the Internet, from web servers to Android smartphones, tablets, and smart TVs. Researchers have uncovered a serious Internet flaw, which if exploited, could allow attackers to terminate or inject malware into un-encrypted communication between any two vulnerable machines on the Internet. The vulnerability could also be used to forcefully terminate HTTPS encrypted connections and downgrade the privacy of secure connections, as well as also threatens anonymity of Tor users by routing them to certain malicious relays. As we all knows that TCP protocol is the heart of all Internet communications, as all application level protocols, including HTTP, FTP, SSH, Telnet, DNS, and SMTP, stand on TCP. Web servers and other applications make use of TCP protocol to establish connections between hosts to transfer data between them.
    A team of six security researchers from the University of California, Riverside and the U.S. Army Research Laboratory has demonstrated a proof-of-concept exploit at the USENIX Security Symposium that can be used to detect if two hosts are communicating over TCP and ultimately attack that traffic. By looking at the picture and watching it closely we can have a clear picture that what is very dangerous if we will.


    Typically, TCP protocol assembles messages into a series of data packets that are identified by unique sequence numbers and transmitted to the receiver. When received, the data packets are then reassembled by the receiver into the original message.

    No comments:

    Post a Comment