How dangeorus is TOCTTOU attack?

Discussion in 'other firewalls' started by CoolWebSearch, Nov 29, 2013.

Thread Status:
Not open for further replies.
  1. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247
    And what it exactly do?
    There is an explanation on wikipedia:
    http://en.wikipedia.org/wiki/Time_of_check_to_time_of_use

    But I'm still not following this, I think I need more lessons...
    How dangerous it is, can it hack into your computer or not?
    Do all firewalls (both software and hardware/routers) protect against this form of attack?
     
  2. explanoit

    explanoit Registered Member

    Joined:
    Dec 1, 2013
    Posts:
    28
    Location:
    USA
    Interesting question. Firewalls would not have involvement in this directly.

    This is a class of software design issue or bug. This is not something an end-user needs to worry about since there's little or nothing they can do about it. It's a type of exploit method in narrow situations where an attacker already has a foothold or path into a system, it's not a specific attack or ghost key.
     
    Last edited: Dec 1, 2013
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.