HP MSR Series Configuration Manual page 497

Hpe flexnetwork msr router series
Hide thumbs Also See for MSR Series:
Table of Contents

Advertisement

Single-packet attack
ICMP type
ICMPv6 type
Land
Large ICMP packet
Large ICMPv6 packet
IP options
IP fragment
IP impossible packet
Tiny fragment
Smurf
TCP flag
Traceroute
WinNuke
UDP bomb
UDP Snork
UDP Fraggle
Description
A receiver responds to an ICMP packet according to its type. An attacker
sends forged ICMP packets of a specific type to affect the packet
processing of the victim.
A receiver responds to an ICMPv6 packet according to its type. An attacker
sends forged ICMPv6 packets of specific types to affect the packet
processing of the victim.
An attacker sends the victim a large number of TCP SYN packets, which
contain the victim's IP address as the source and destination IP addresses.
This attack exhausts the half-open connection resources on the victim, and
locks the victim's system.
An attacker sends large ICMP packets to crash the victim. Large ICMP
packets can cause memory allocation error and crash the protocol stack.
An attacker sends large ICMPv6 packets to crash the victim. Large
ICMPv6 packets can cause memory allocation error and crash the protocol
stack.
An attacker sends IP datagrams in which the IP options are abnormal. This
attack intends to probe the network topology. The target system will break
down if it is incapable of processing error packets.
An attacker sends the victim an IP datagram with an offset smaller than 5
but greater than 0, which causes the victim to malfunction or crash.
An attacker sends IP packets whose source IP address is the same as the
destination IP address, which causes the victim to malfunction.
An attacker makes the fragment size small enough to force Layer 4 header
fields into the second fragment. These fragments can pass the packet
filtering because they do not hit any match.
An attacker broadcasts an ICMP echo request to target networks. These
requests contain the victim's IP address as the source IP address. Every
receiver on the target networks will send an ICMP echo reply to the victim.
The victim will be flooded with replies, and will be unable to provide
services. Network congestion might occur.
An attacker sends packets with defective TCP flags to probe the operating
system of the target host. Different operating systems process
unconventional TCP flags differently. The target system will break down if it
processes this type of packets incorrectly.
An attacker uses traceroute tools to probe the topology of the victim
network.
An attacker sends Out-Of-Band (OOB) data to the TCP port 139 (NetBIOS)
on the victim that runs Windows system. The malicious packets contain the
Urgent Pointer, which causes the victim's operating system to crash and
display a Blue Screen of Death (BSOD).
An attacker sends a malformed UDP packet. The length value in the IP
header is larger than the IP header length plus the length value in the UDP
header. When the target system processes the packet, a buffer overflow
can occur, which causes a system crash.
An attacker sends a UDP packet with destination port 135 (the Microsoft
location service) and source port 135, 7, or 19. This attack causes an NT
system to exhaust its CPU.
An attacker sends a large number of chargen packets with source UDP
port 7 and destination UDP port 19 to a network. These packets uses the
victim's IP address as the source IP address. Replies will flood the victim,
resulting in DoS.
482

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents