2-4 Flashcards
a smurf atack is clever and simple. the hardest part of the attack is _________
getting the packets started on the netowork
you can protect agains a smurf attack in 2 ways.
- configure your routers so the don’t forward any ______ .
- guard against __________.
direct broadcast messages // trojan horses
Using _______ serves is critical . ______ servers can hide the internal IP addresses of your machine, wich will make it a lot less vulnerable to smurf attack
proxy
the simplest form of DOS attack, based on overloading the target system.
Ping of death
tcp packets are limited in size so ending a packet that is too large can sometimes _______
shut down a system
___ works to comprimise systems that cant deal with extremely large packet sizes
Ping of death
_____ flood attack occurs when an attacker sends ___ packet to random port on the victim system. when the system receives a _____ packet it determines if the app is waiting on the destination port. When there is no app waiting it generates a ICMP packet of destination unreachable. if enough ____ packets are delivered the system goes down
UDP
_______ flood is another name for ping flood
ICMP
if enough requests flood onto the network , the attacker can completely exhaust the address space allocated by the DHCP servers for an indefinate period of time. a tool called gobbler can prevent this. preventing incoming dhcp requests will prevent this
dhcp starvation
sends a legitimate http post message . partof the post message is the content length( this indicates the size of the message to follow. the attacker then sends the actual message at an extremely slow rate. the server is then hung up waiting for the process to complete.
http post dos
an atack that is so sever that the victim either needs a os reinstall or new hardware.
pdos / permenent denial of service
this is a special dos attack. accomplished by getting a number of machines to attack a selected target. rather then getting the computers to attack the target, this method tricks the routers into attacking the target. many routers on the internet backbone communicate on port 179. this attack exploits that line of communication and gets routers to attack a target system.
distributed reflection denial of service
dos attacks are common because there are ______ available to execute these attacks
tools
a well known online based tool to launch dos attacks
low orbit ion cannon
more advanced then low orbit ion cannon, but simpler to run
high orbit ion cannon