P320W Support Notes
2.Those that exploits weaknesses in the TCP/IP specification such as SYN Flood and LAND Attacks.
3.
4.IP Spoofing
What is Ping of Death attack?
Ping of Death uses a 'PING' utility to create an IP packet that exceeds the maximum 65535 bytes of data allowed by the IP specification. The oversize packet is then sent to an unsuspecting system. Systems may crash, hang, or reboot.
What is Teardrop attack?
Teardrop attack exploits weakness in the reassemble of the IP packet fragments. As data is transmitted through a network, IP packets are often broken up into smaller chunks. Each fragment looks like the original packet except that it contains an offset field. The Teardrop program creates a series of IP fragments with overlapping offset fields. When these fragments are reassembled at the destination, some systems will crash, hang, or reboot.
What is SYN Flood attack?
SYN attack floods a targeted system with a series of SYN packets. Each packet causes the targeted system to issue a
What is LAND attack?
In a LAN attack, hackers flood SYN packets to the network with a spoofed source IP address of the targeted system. This makes it appear as if the host computer sent the packets to itself, making the system unavailable while the target system tries to respond to itself.
What is Brute-force attack?
A
61
All contents copyright (c) 2005 ZyXEL Communications Corporation.