The document discusses various types of cyber attacks including denial of service attacks, man-in-the-middle attacks, password cracking attacks, and social engineering attacks. Specific attack methods covered include TCP SYN floods, Smurf attacks, password brute force, and dictionary attacks. Defense strategies proposed include ingress filtering, disk quotas, firewalls, and intrusion detection systems.
23. Ping of Death
• a#
– ˜Ping of Death™J¾_ïÔ@}Y ping Ë
(ICMP echo request) dø¿ÓàP
(Overflow)d1þ¬çÌ,Ml6*Ð…Úf
24. LAND Attack
• ¸Øk; IP ý Y¦”L·CZÔY
dZI8U~fY IP gi·ÓJfzÚ
œY IP gdø¿Z8U~fz¹Ÿ=p·
‰Suf
• äG¸ØøÿT,*8ûUÐc)£ê…Ú
Ì,Ml6*
From : 60.44.35.11:23
TO: 64.44.35.11:23
fzڜ
8U~fYYIPß´ 60.44.35.11
¸Øk
8U~fYY¹Ÿ=´ Port 23 Open Crash
211.3.56.22
36. ¹Ÿ=§:
• TCP/IP X›d6 65536 H¹Ÿ=d*‰Á.
¹ŸYLÃ
– TCP ~ UDP port
• ¹Ÿ=§:Yôf®¯õ»
fzeØûU
Ôš¼Y¹Ÿ=d†þ±IÞd6,c)
ø¿4JnõSG*8ûU.
A Port Scan B
Port 1000,2000,3000....
¸Ø