In Section 8.6.1, it is shown that without sequence numbers, Trudy (a woman- in-the middle) can wreak havoc in an SSL session by interchanging TCPsegments. Can Trudy do something similar by deleting a TCP segment? What does she need to do to succeed at the deletion attack? What effect will it have?
Trudy is able to remove the data sent between Alice and Bob.
Reason is that t is shown that without sequence numbers, Trudy (a woman- in-the middle) can wreak havoc in an SSL session by interchanging TCPsegments. In this case replace a dummy packet is repalced in the deleted packet and sent to some one.