联系方式

  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-21:00
  • 微信:codinghelp

您当前位置:首页 >> Java编程Java编程

日期:2023-06-14 09:14

CS 6823 –Network Security

Lab 1 Overview


Task 1: SYN Flood Attacks

Test telnet during a SYN Flood, with SYN Flood protections ON and OFF

There are two SYN Flood protection methods:

SYN Cookies

Reserve TCP Connections for “proven destinations”

Task 2: TCP RST Attack

Guess the correct SEQ/ACK Number to perform a RST Attack

5% bonus for fully automating the attack

Task 3: TCP Session Hijacking

Guess the correct SEQ/ACK, 5% for automating the attack

Task 4:

Reverse shell. Same as Task 3, but add a reverse shell exploit

SYN flood defense: SYN cookies (1)


When SYN segment arrives, host B calculates function (hash) based on:

Apache example: Source and destination IP addresses and port numbers, and a secret number

Host B uses resulting “cookie” for its initial seq # (ISN) in SYNACK

Host B does not allocate anything to half-open connection:

Does not remember A’s ISN

Does not remember cookie

SYN flood defense: SYN cookies (2)


If SYN is legitimate


Host A returns ACK


Host B computes same function, verifies function = ACK # in ACK segment


Host B creates socket for connection


Legit connection established without the need for half-open connections


If SYN-flood attack with spoofed IP address


No ACK comes back to B for connection.


No problem: B is not waiting for an ACK


TCP RST Attack


Attacker can break the TCP connection by sending a TCP RST

Must match the SEQ and ACK Numbers

Session hijacking


Take control of one side of a TCP connection

Marriage of sniffing and spoofing

Session hijacking: The details


Attacker is on segment where traffic passes from Alice to Bob

Attacker sniffs packets

Sees TCP packets between Bob and Alice and their sequence numbers

Attacker jumps in, sending TCP packets to Bob; source IP address = Alice’s IP address

Bob now obeys commands sent by attacker, thinking they were sent by Alice

Principal defense: encryption w/ auth protocol

Attacker does not have keys to encrypt and insert meaningful traffic


版权所有:编程辅导网 2021 All Rights Reserved 联系方式:QQ:99515681 微信:codinghelp 电子信箱:99515681@qq.com
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。 站长地图

python代写
微信客服:codinghelp