PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

The spoofed IP address used by the attacker as the sour…

What sort of attack is described by the following: An attacker has a list of broadcast addresses which it stores
into an array, the attacker sends a spoofed icmp echo request to each of those addresses in series and starts
again. The spoofed IP address used by the attacker as the source of the packets is the target/victim IP
address.


Page 49 of 1,070« First...102030...4748495051...607080...Last »