Which type of attack will make use of misconfigured third party systems to perpetrate a DoS?

Which type of attack will make use of misconfigured third party systems to perpetrate a DoS?

Which type of attack will make use of misconfigured third party systems to perpetrate a DoS?

A.
Smurf

B.
Session hijacking

C.
Teardrop

D.
Land

Explanation:
Answer A is correct; smurf attacks are a DoS attack that use spoofed ICMP Echo Requests sent to misconfigured third parties (amplifiers) to attempt to exhaust the resources of the victim.

Incorrect Answers and Explanations: B, C, and D: Answers B, C, and D are incorrect. Session hijacking involves a combination of sniffing and spoofing in order for the attacker to masquerade as one or both ends of an established connection. The teardrop attack is a DoS that works by sending overlapping fragments that, when received by a vulnerable host, can cause a system to crash. The land attack is a malformed packet DoS that can cause vulnerable systems to crash by sending a SYN packet with both the source and destination IP address set to that of the victim.



Leave a Reply 2

Your email address will not be published. Required fields are marked *

2 + fifteen =


Joe

Joe

smurf attacks are a DoS attack that use spoofed ICMP Echo Requests sent to misconfigured third parties (amplifiers) to attempt to exhaust the resources of the victim.
The teardrop attack is a DoS that works by sending overlapping fragments
Session hijacking involves a combination of sniffing and spoofing in order for the attacker to masquerade as one or both ends of an established connection.
The land attack is a malformed packet DoS that can cause vulnerable systems to crash by sending a SYN packet with both the source and destination IP address set to that of the victim