Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from
a separate company server on the Internet?
A.
SYN flood
B.
Teardrop
C.
Smurf
D.
FTP bounce
Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from
a separate company server on the Internet?
Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from
a separate company server on the Internet?
A.
SYN flood
B.
Teardrop
C.
Smurf
D.
FTP bounce
smurf attack floods network w/ BA and spoofs victims IP add
SYN flood- attacker sends a succession of SYN requests to a target’s system to consume server resources
teardrop attack- sends mangled IP fragments with overlapping, over-sized payloads to the target machine
FTP bounce attack- an exploit of the FTP protocol whereby an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man for the request.