What is the technique that Eve used in the case above?

Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to
her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to
forge the packets and uses the broadcast address. She launches an attack similar to that of

fraggle. What is the technique that Eve used in the case above?

Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to
her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to
forge the packets and uses the broadcast address. She launches an attack similar to that of

fraggle. What is the technique that Eve used in the case above?

A.
Smurf

B.
Bubonic

C.
SYN Flood

D.
Ping of Death

Explanation:
A fraggle attack is a variation of the smurf attack for denial of service in which the attacker sends
spoofed UDP packets instead of ICMP echo reply (ping) packets to the broadcast address of a
large network.



Leave a Reply 1

Your email address will not be published. Required fields are marked *