Answered step by step
Verified Expert Solution
Question
1 Approved Answer
N 6 . 5 . Does a SYN flooding attack cause the victim server to freeze? N 6 . 6 . In the SYN flooding
N Does a SYN flooding attack cause the victim server to freeze?
N In the SYN flooding attack, why do we randomize the source IP address? Why can't we
just use the same IP address?
N What will happen if the spoofed source IP address in a SYN flooding attack does
belong to a machine that is currently running?
N An attacker launches a SYN flooding attack against the telnet server on a target
ma chine. This particular telnet server listens to two ports, port and port The
attack is only targeting the default telnet port When the attack is undergoing, can
people still be able to telnet to the server using port
N Can we launch a SYN flooding attack from a computer without using the root privilege?
N Why do we choose to fill up the memory used for halfopen connections, why cannot
we directly target the memory used for holding full connections? The latter requires more
memory, so the resource is much easier to exhaust.
N If TCP always uses a fixed sequence number eg zero in its
SYN ACK packet during the threeway handshake protocol, please
describe how you can conduct a denial ofservice attack on the TCP
server. Your objective is different from the SYN flooding attack: you
want to cause the server to establish connections with many non
existing computers, and thus exhausting the server's resources,
especially its memory.
N All the information that a server needs to know about a
connection is not only con tained in the SYN packet, but
also in the final ACK packet from the client. Therefore,
informationwise, there is no need to allocate a buffer to save
the information about halfopen connections. If we get rid of
this buffer, the SYN flooding attack will not be effective any
more. Do you agree with such a statement or not. Please
justify your answer.
N To reset a connection between two remote machines, ie we
will not be able to see the packets between these two
machines, what are the main challenges?
N There is an active connection between a Telnet client and a Telnet server
The server has just acknowledged a sequence number and the client has
just acknowledged a sequence number An attacker wants to launch the TCP session
hijacking attack on the connection, so he can execute a command on the server. He is on the
same local area network as these two computers. You need to construct a TCP packet for the
attacker. Please fill in the following fields:
Source IP and Destination IP
Source port and Destination port
Sequence number
The TCP data field.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started