Front | Back |
Smurf
|
This is based on the ICMP echo reply. The
ICMP ping request is spoofed and is
broadcasted to all computers which then
also reply to the spoofed source IP
address.
|
Fraggle
|
The same as a Smurf attack but it used
UDP packets instead of ICMP.
|
SYN Flood
|
Repeated SYN requests are made without ever sending the final ACK which keeps these requests "open".
|
Land
|
Spoofed TCP SYN requests are made using the victims IP address as the source address causing the victim to bounce SYN requests off of itself.
|
Teardrop
|
Mangled, overlapped and fragmented UDP packets are sent to a victim and they cannot be reassembled. This can cause the OS to crash.
|
Bonk
|
An attack on prt 53 using fragemented UDP packets with incorrect reassembly information.
|
Boink
|
Same think as the Bonk attack but this occurs on multiple ports.
|