The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environments. However, there exist several security vulnerabilities in the TCP speci cation and additional weaknesses in a number of widely-available implementations of TCP. These vulnerabilities may enable an intruder to attack" TCP-based systems, enabling him her to hijack" a TCP connection or cause denial of service to legitimate users. We analyze TCP code via a reverse engineering" technique called slicing" to identify several of these vulnerabilities, especially those that are related to the TCP state-transition diagram. We discuss many of the aws present in the TCP implementation of many widely used operating systems, such as SUNOS