ISC Exam Questions

Which attack type below does NOT exploit TCP vulnerabilities?

Which attack type below does NOT exploit TCP vulnerabilities?

A.
Sequence Number attack

B.
Ping of Death

C.
SYN attack

D.
land.c attack

Explanation:
The Ping of Death exploits the fragmentation vulnerability of large ICMP ECHO request packets by
sending an illegal packet with more than 65K of data, creating a buffer overflow. * a TCP sequence

number attack, which exploits the nonrandom predictable pattern of TCP connection sequence
numbers to spoof a session. * a TCP SYN attack, is a DoS attack that exploits the TCP threeway
handshake. The attacker rapidly generates randomly sourced SYN packets filling the target’s
connection queue before the connection can timeout. * land.c attack, is also a DoS attack that
exploits TCP SYN packets. The attacker sends a packet that gives both the source and destination as
the target’s address, and uses the same source and destination port. Sources: Designing Network
Security by Merike Kaeo (Cisco Press, 1999) and Mastering Network Security by Chris Brenton
(Sybex, 1999).