Which attack type below does NOT exploit TCP vulnerabilities?
A.
Sequence Number attack
B.
Ping of Death
C.
SYN attack
D.
land.c attack
Explanation:
The Ping of Death exploits the fragmentation vulnerability of large
ICMP ECHO request packets by sending an illegal packet with more
than 65K of data, creating a buffer overflow.
* a TCP sequence number attack, which exploits the nonrandom predictable
pattern of TCP connection sequence numbers to spoof a session.
* a TCP SYN attack, is a DoS attack that exploits the TCP threeway
handshake. The attacker rapidly generates randomly sourced SYN
packets filling the target’s connection queue before the connection can
timeout.
* land.c attack, is also a DoS attack that exploits TCP
SYN packets. The attacker sends a packet that gives both the source and
destination as the target’s address, and uses the same source and destination
port. Sources: Designing Network Security by Merike Kaeo (Cisco
Press, 1999) and Mastering Network Security by Chris Brenton (Sybex,
1999).