EasyManua.ls Logo

Proscend 6200-2W - Page 61

Proscend 6200-2W
93 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
58
X’mas tree scan: It can send a TCP frame to a remote device with the URG, PUSH, and FIN flags set. This is called a
Xmas tree scan because of the alternating bits turned on and off in the flags byte, much like the lights of a Christmas
tree.
Null scan: The null scan turns off all flags, creating a lack of TCP flags that should never occur in the real world.
SYN flood: A SYN flood is a form of denial-of-service attack, attempts to slow your network by requesting new
connections but not completing the process to open the connection. Once the buffer for these pending connections is
full a server will not accept any more connections and will be unresponsive.
ICMP flood: A sender transmits a volume of ICMP request packets to cause all CPU resources to be consumed serving
the phony requests.
UDP Flood: A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol(UDP). A sender
transmits a volume of requests for UDP diagnostic services which cause all CPU resources to be consumed serving the
phony requests.
Ping of Death: A ping of death (POD) attack attempts to crash your system by sending a fragmented packet, when
reconstructed is larger than the maximum allowable size.
Land attack: A land attack is an attempt to slow your network down by sending a packet with identical source and
destination addresses originating from your network.
IP Spoofing: IP Spoofing is a method of masking the identity of an intrusion by making it appeared that the traffic came
from a different computer. This is used by intruders to keep their anonymity and can be used in a Denial of Service

Related product manuals