ZyWALL 10/50 Internet Security Gateway
for use over a single port, such as Web on port 80, other ports are also active. If the person configuring or managing the computer is not careful, a hacker could attack it over an unprotected port.
Some of the most common IP ports are:
Table21 | FTP | 53 | DNS |
23 | Telnet | 80 | HTTP |
25 | SMTP | 110 | POP3 |
|
|
|
|
10.4.2 Types of DoS Attacks
There are four types of DoS attacks:
1.Those that exploit bugs in a TCP/IP implementation.
2.Those that exploit weaknesses in the TCP/IP specification.
3.
4.IP Spoofing.
1."Ping of Death" and "Teardrop" attacks exploit bugs in the TCP/IP implementations of various computer and host systems.
2.Weaknesses in the TCP/IP specification leave it open to "SYN Flood" and "LAND" attacks. These attacks are executed during the handshake that initiates a communication session between two applications.
Firewalls |