
A legacy web server in your company is suffering from a denial of service attack from a malicious source. Which of the following techniques is least likely used by the attacker? (Wentz QOTD)
A. Overlapping IP fragments
B. Spoofing the source IP address
C. Crafting ICMP Packet
D. Sending malformed or oversized packets
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
My suggested answer is B. Spoofing the source IP address.
Wentz’s book, The Effective CISSP: Security and Risk Management, helps CISSP and CISM aspirants build a solid conceptual security model. It is a tutorial for information security and a supplement to the official study guides for the CISSP and CISM exams and an informative reference for security professionals.
Reference
- Attacks to be performed Using Hping3 (Packet Crafting)
- Packet crafting: a serious crime!
- Exploiting Buffer Overflow vulnerability to do Privilege Escalation
- Privilege escalation: What you need to know and how to defend your network
- IP Fragmentation Attack
- Teardrop Attack
- Ping of death
- What Is a Ping of Death Attack?
- Ping of Death (POD)
- Smurf Attack Meaning
- What is a Smurf Attack?
- Smurf DDoS attack
貴公司一台老舊的 Web 主機正遭受一個惡意來源的阻斷式攻擊(DoS)。 攻擊者最不可能使用以下哪種技術? (Wentz QOTD)
A. 重疊的 IP 片段
B. 欺騙來源IP地址
C. 製作 ICMP 數據包
D. 發送畸形或超大數據包