Monday, 4 July 2011

‘Syn Flood’ Latest Update

* Create a random attacker source address For Each packet
* SYN flag set in EACH packet Is A request to open a new connection to the server from the spoofed IP address
* Respond to victim spoofed IP address, then waits for confirmation that never arrived (waits about 3 minutes)
* Victim’s connection table fills up waiting for replies
* After table fills up, all new connections are ignored
‘Syn Flood’ Latest Update

No comments:

Post a Comment