I would like to understand how does the SSL implicit sequence number helps SSL in detecting rogue TCP packets?
In fact, the RFC 6101 states :
sequence numbers: Each party maintains separate sequence numbers for transmitted and received messages for each connection. When a party sends or receives a change cipher spec message, the appropriate sequence number is set to zero. Sequence numbers are of type uint64 and may not exceed 2^64-1.
Could not an attacker take advantage of the pre-knowledge of how SSL sequence numbers behave to conduct a successful attack?