Steven examines the following Ethereal capture:

Steven, a security analyst for XYZ associates, is analyzing packets captured by Ethereal on a Linux server inside his network when the server starts to slow down tremendously. Steven examines the following Ethereal capture:

Steven, a security analyst for XYZ associates, is analyzing packets captured by Ethereal on a Linux server inside his network when the server starts to slow down tremendously. Steven examines the following Ethereal capture:

A.
SYN flood

B.
ARP spoofing

C.
Smurf attack

D.
Ping of Death

Explanation:
A perpetrator is sending a large amount of ICMP echo (ping) traffic to IP broadcast addresses, all of it having a spoofed source address of the intended victim. If the routing device delivering traffic to those broadcast addresses performs the IP broadcast to layer 2 broadcast function, most hosts on that IP network will take the ICMP echo request and reply to it with an echo reply, multiplying the traffic by the number of hosts responding.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Emmaline Hewlett

Emmaline Hewlett

I have recently started a blog, the info you provide on this web site has helped me tremendously. Thanks for all of your time & work.

http://www.bastcilkdoptb.com/