You are the system administrator for a provider that owns a large network (e.g., at least 64,000 IP addresses). Show how you can use SYN cookies to perform a DOS attack on a web server

What will be an ideal response?

The rogue administrator initiates a large number of TCP connections to the
web server spoofing source IP addresses from his network. Also, he intercepts the SYN
ACK responses from the server and sends back spoofed ACKs to complete the handshakes
for these connections. The web server has now created a large number of sessions that will
remain open, using up resources, until they time out. This attack works even if the web
server uses SYN cookies.

Computer Science & Information Technology

You might also like to view...

When creating a form, Access might automatically add a(n) ________ if more than one table is related

Fill in the blank(s) with correct word

Computer Science & Information Technology

A history of websites visited can be retrieved from a hidden file called ________. dat

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology