ISC Exam Questions

Which attack type below does NOT exploit TCP vulnerabilities?

Which attack type below does NOT exploit TCP vulnerabilities?

A.
Sequence Number attack

B.
Ping of Death

C.
SYN attack

D.
land.c attack

Explanation:
The Ping of Death exploits the fragmentation vulnerability of large
ICMP ECHO request packets by sending an illegal packet with more
than 65K of data, creating a buffer overflow.
* a TCP sequence number attack, which exploits the nonrandom predictable
pattern of TCP connection sequence numbers to spoof a session.
* a TCP SYN attack, is a DoS attack that exploits the TCP threeway
handshake. The attacker rapidly generates randomly sourced SYN
packets filling the target’s connection queue before the connection can
timeout.
* land.c attack, is also a DoS attack that exploits TCP
SYN packets. The attacker sends a packet that gives both the source and
destination as the target’s address, and uses the same source and destination
port. Sources: Designing Network Security by Merike Kaeo (Cisco
Press, 1999) and Mastering Network Security by Chris Brenton (Sybex,
1999).