PrepAway - Latest Free Exam Questions & Answers

Which attack type below does NOT exploit TCP vulnerabilities?

Which attack type below does NOT exploit TCP vulnerabilities?

PrepAway - Latest Free Exam Questions & Answers

A.
Sequence Number attack

B.
Ping of Death

C.
SYN attack

D.
land.c attack

Explanation:
The Ping of Death exploits the fragmentation vulnerability of large ICMP ECHO request packets by
sending an illegal packet with more than 65K of data, creating a buffer overflow. * a TCP sequence

number attack, which exploits the nonrandom predictable pattern of TCP connection sequence
numbers to spoof a session. * a TCP SYN attack, is a DoS attack that exploits the TCP threeway
handshake. The attacker rapidly generates randomly sourced SYN packets filling the target’s
connection queue before the connection can timeout. * land.c attack, is also a DoS attack that
exploits TCP SYN packets. The attacker sends a packet that gives both the source and destination as
the target’s address, and uses the same source and destination port. Sources: Designing Network
Security by Merike Kaeo (Cisco Press, 1999) and Mastering Network Security by Chris Brenton
(Sybex, 1999).


Leave a Reply