Notifications
Clear all

Loop Holes in TCP/IP Suite | Seminar PPT

1 Posts
1 Users
0 Likes
117 Views
(@admin_seminarprojects-org)
Posts: 13
Member Admin
Topic starter
 

Loop Holes in TCP/IP Suite

 

  1. TCP "SYN" Attacks: SYN flood attacks involve sending a flood of TCP connection requests with spoofed source IP addresses, overwhelming a server and preventing legitimate connections.

  2. IP Spoofing: This is a technique where an attacker impersonates a trusted IP address to gain unauthorized access or hide their identity.

  3. Sequence Guessing: Attackers may attempt to guess the sequence numbers used in TCP communication to hijack a session or inject malicious data.

  4. Source Routing: In this attack, an attacker specifies the route packets should take through a network, potentially bypassing security measures or gaining unauthorized access.

  5. Session Hijacking: Attackers attempt to take over an established network session, typically by stealing session cookies or tokens, to gain unauthorized access.

  6. Desynchronization during connection establishment: This attack disrupts the synchronization process during TCP connection setup, making it difficult for communication to be established properly.

  7. Desynchronization in the middle of a connection: This attack interferes with the ongoing communication between two parties, causing data loss or miscommunication.

  8. RIP (Routing Information Protocol) Attacks: Attackers may manipulate or flood the RIP protocol to disrupt routing in a network, potentially leading to traffic redirection or denial of service.

  9. ICMP Attacks: Internet Control Message Protocol (ICMP) can be abused in various ways, such as ICMP flood attacks (ping flood) to overwhelm a target's network.

  10. DNS Attacks: These attacks target the Domain Name System (DNS) infrastructure, aiming to disrupt or redirect DNS queries, leading to website impersonation or denial of service.

  11. The Lack of Unique Identifiers: Inadequate authentication or unique identifier systems can lead to impersonation, unauthorized access, or data breaches, as users or entities are not properly verified.

 
Posted : 08/10/2023 9:08 am
Share: