PrepAway - Latest Free Exam Questions & Answers

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary a

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

PrepAway - Latest Free Exam Questions & Answers

A.
Fraggle Attack

B.
Man in the Middle Attack

C.
Trojan Horse Attack

D.
Smurf Attack

E.
Back Orifice Attack

Explanation:
Trojan and Back orifice are Trojan horse attacks. Man in the middle spoofs the Ip and redirects the victems packets to the cracker The infamous Smurf attack. preys on ICMP’s capability to send traffic to the broadcast address. Many hosts can listen and respond to a single ICMP echo request sent to a broadcast address.
Network Intrusion Detection third Edition by Stephen Northcutt and Judy Novak pg 70 The "smurf" attack’s cousin is called "fraggle", which uses UDP echo packets in the same fashion as the ICMP echo packets; it was a simple re-write of "smurf".


Leave a Reply