Security+ Exam Attacks Flashcards

Start Studying and prepare for the Security+ Exam Attacks with our easy and simple flashcard quizzes. Learn key terms, vocabulary, and definitions, and much more of the Security+ Exam Attacks with the help of our flashcards quizzes with ease.

7 cards   |   Total Attempts: 197
  

Cards In This Set

Front Back
Smurf
This is based on the ICMP echo reply. The ICMP ping request is spoofed and is broadcasted to all computers which then also reply to the spoofed source IP address.
Fraggle
The same as a Smurf attack but it used UDP packets instead of ICMP.
SYN Flood
Repeated SYN requests are made without ever sending the final ACK which keeps these requests "open".
Land
Spoofed TCP SYN requests are made using the victims IP address as the source address causing the victim to bounce SYN requests off of itself.
Teardrop
Mangled, overlapped and fragmented UDP packets are sent to a victim and they cannot be reassembled. This can cause the OS to crash.
Bonk
An attack on prt 53 using fragemented UDP packets with incorrect reassembly information.
Boink
Same think as the Bonk attack but this occurs on multiple ports.