terms Flashcards
Substitution
replaces symbols
Codes
replace words
ciphers
replace letters
transposition
rearranges symbols
Confusion
Obscure the relationship between input, output, and key. This is usually done by substitution
Diffusion
Spread out the influence of bits of input. Usually done by permutation or transposition.
TCP exploits: types of scans
SYN Scan
FIN scan
ACK scan - a way to defeat firewalls
TCP connect
go through whole connection
SYN Scan
2/3 of handshake. As soon as target responds with SYN-ACK , RESET. Less likely to be detected by servers. May results in SYN flood.
FIN scan
teardown nonexistent connections
Open ports don’t respond
Closed port send a RESET
ACK scans
if the firewall allows ACK packets without keeping session info, then an easy exploit