Professional Documents
Culture Documents
ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
NEXUS IT TRAINING CENTER
The Increasing Threat to Security
Over the years, tools and methods have evolved.
–In 1985 an attacker had to have sophisticated
computer, knowledge to make tools and basic attacks.
–As time went on, and attackers' tools improved,
NEXUS IT TRAINING CENTER
Ping of Death
–A ping is normally 64 (84 bytes with the header).
–The IP packet size could be up to 65,535 bytes.
–A ping of this size may crash an older computer.
SYN Flood
–A SYN flood attack exploits the TCP 3-way handshake.
•It sending multiple SYN requests to a targeted server.
•The server replies with SYN-ACK, but the malicious host
never responds the ACK to complete the handshake.
•This ties up the server until it runs out of resources.
E-mail bombs
–Programs send bulk e-mails monopolizing services.
Malicious applets
–These attacks are Java, JavaScript, or ActiveX that
cause destruction or tie up computer resources.
NEXUS IT TRAINING CENTER
DDoS Attacks
Distributed DoS (DDoS) attacks are designed to
saturate network links with illegitimate data.
–Typically, there are 3 components to a DDoS attack.
•A Client who is typically a person who launches the attack.
NEXUS IT TRAINING CENTER