ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 160 Topic 17 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 160 Topic 17 Discussion

EC0-350 Exam Topic 17 Question 160 Discussion:
Question #: 160
Topic #: 17

After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of its choosing, which then must be acknowledged (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen, and then opens a second connection from a forged IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP address is used for authentication, then the attacker can use the one-sided communication to break into the server. What attacks can you successfully launch against a server using the above technique?


A.

Denial of Service attacks


B.

Session Hijacking attacks


C.

Web page defacement attacks


D.

IP spoofing attacks


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.