Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?
A. SYN flood
B. Teardrop
C. Smurf
D. FTP bounce
One Comment on “Which of the following attacks would allow an intruder to do port mapping on a company’s internal server”
Shirley Mathewsays:
smurf attack floods network w/ BA and spoofs victims IP add
SYN flood- attacker sends a succession of SYN requests to a target’s system to consume server resources
teardrop attack- sends mangled IP fragments with overlapping, over-sized payloads to the target machine
FTP bounce attack- an exploit of the FTP protocol whereby an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man for the request.
smurf attack floods network w/ BA and spoofs victims IP add
SYN flood- attacker sends a succession of SYN requests to a target’s system to consume server resources
teardrop attack- sends mangled IP fragments with overlapping, over-sized payloads to the target machine
FTP bounce attack- an exploit of the FTP protocol whereby an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man for the request.
0
0