PrepAway - Latest Free Exam Questions & Answers

A TCP SYN Attack:

A TCP SYN Attack:

PrepAway - Latest Free Exam Questions & Answers

A.
requires a synchronized effort by multiple attackers

B.
takes advantage of the way a TCP session is established

C.
may result in elevation of privileges.

D.
is not something system users would notice

Explanation:
“[SYN Flood] Attackers can take advantage of this design flaw by continually sending the victim SYN
messages with spoofed packets. The victim will commit the necessary resources to setup this
communication socket, and it will send its SYN/ACK message waiting for the ACK message in return.
However, the victim will never receive the ACK message, because the packet is spoofed, and victim
system sent the SYN/ACK message to a computer that does not exist. So the victim system receives a
SYN message, add it dutifully commits the necessary resources to setup a connection with another
computer. This connection is queued waiting for the ACK message, and the attacker sends another
SYN message. The victim system does what is supposed to can commits more resources, sends the
SYN/ACK message, and queues this connection. This may only need to happen a dozen times before
the victim system no longer has the necessary resources to open up another connection. This makes
the victim computer unreachable from legitimate computers, denying other systems service from
the victim computer.” Pg. 735 Shon Harris CISSP All-In-One Exam Guide


Leave a Reply