Explain why an attacker typically uses an ACK scan to bypass a firewall?

What will be an ideal response?

ACK scan-Attackers typically use ACK scans to get past a firewall or other filtering device. A filtering device looks for the SYN packet, the first packet in the three-way handshake, that the ACK packet was part of. Remember this packet order: SYN, SYN/ACK, and ACK. If the attacked port returns an RST packet, the packet filter was fooled, or there's no packet-filtering device. In either case, the attacked port is considered to be "unfiltered."

Computer Science & Information Technology

You might also like to view...

A theme is any color, font, shape, or style that contributes to the tone or meaning of the presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

What two types of attacks are VoIP call managers and VoIP phones most likely to be susceptible to?

A. DoS and malware B. Worms and Trojans C. DoS and host OS attacks D. Host OS attacks and buffer overflows

Computer Science & Information Technology