Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

N 6 . 5 . Does a SYN flooding attack cause the victim server to freeze? N 6 . 6 . In the SYN flooding

N6.5. Does a SYN flooding attack cause the victim server to freeze?
N6.6. In the SYN flooding attack, why do we randomize the source IP address? Why can't we
just use the same IP address?
N6.7. What will happen if the spoofed source IP address in a SYN flooding attack does
belong to a machine that is currently running?
N6.8. An attacker launches a SYN flooding attack against the telnet server on a target
ma- chine. This particular telnet server listens to two ports, port 23 and port 8023. The
attack is only targeting the default telnet port 23. When the attack is undergoing, can
people still be able to telnet to the server using port 8023?
N6.9. Can we launch a SYN flooding attack from a computer without using the root privilege?
N6.10. Why do we choose to fill up the memory used for half-open connections, why cannot
we directly target the memory used for holding full connections? The latter requires more
memory, so the resource is much easier to exhaust.
N6.11. If TCP always uses a fixed sequence number (e.g., zero) in its
SYN + ACK packet during the three-way handshake protocol, please
describe how you can conduct a denial- of-service attack on the TCP
server. Your objective is different from the SYN flooding attack: you
want to cause the server to establish connections with many non-
existing computers, and thus exhausting the server's resources,
especially its memory.
N6.12. All the information that a server needs to know about a
connection is not only con- tained in the SYN packet, but
also in the final ACK packet from the client. Therefore,
information-wise, there is no need to allocate a buffer to save
the information about half-open connections. If we get rid of
this buffer, the SYN flooding attack will not be effective any
more. Do you agree with such a statement or not. Please
justify your answer.
N6.13. To reset a connection between two remote machines, i.e., we
will not be able to see the packets between these two
machines, what are the main challenges?
N6.16. There is an active connection between a Telnet client (10.0.2.5) and a Telnet server
(10.0.2.9). The server has just acknowledged a sequence number 1000, and the client has
just acknowledged a sequence number 3000. An attacker wants to launch the TCP session
hijacking attack on the connection, so he can execute a command on the server. He is on the
same local area network as these two computers. You need to construct a TCP packet for the
attacker. Please fill in the following fields:
Source IP and Destination IP
Source port and Destination port
Sequence number
The TCP data field.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Management Systems Designing And Building Business Applications

Authors: Gerald V. Post

1st Edition

0072898933, 978-0072898934

More Books

Students also viewed these Databases questions

Question

Recall the principles of conducting orientation training.

Answered: 1 week ago

Question

Explain the steps involved in training programmes.

Answered: 1 week ago

Question

What are the need and importance of training ?

Answered: 1 week ago

Question

What is job rotation ?

Answered: 1 week ago