PROLiNK PRN3009 Product User Manual page 79

Wireless-n 300mbps router
Hide thumbs Also See for PRN3009:
Table of Contents

Advertisement

PROLiNK® PRN3009
Wireless-N 300 Routers
Flooding - The attack flooding requests in a short time, and cause the service is not available for legal
requests because of the server busy handling invalid flooding requests. This is the most widely used
attack.
ICMP Smurf - Broadcast ICMP Smurf and Unicast ICMP Smurf are available. In the first attack, a
broadcast ICMP echo request will be sent, and the network may be blocked while all hosts of the
network sending replies. This attack may have no effect when little hosts available in the network; In
the second attack, the victim's IP address is used as a source IP address when sending ICMP echo
requests. The victim host will reply to the echo request to itself, which may cause the system to crash.
IP Land - The attacker sends a TCP SYN packet with both source and destination addresses set to the
victim's IP address. The victim will reply SYN-ACK with to itself and create a null connection. Lots of
connections will use up the memory.
IP Spoof - The attacker sends lots of packets with a non-existed source IP address, which may cause
the server has no time handling legal requests while busy waiting for the responses from the non-
existed IP address.
IP Tear Drop - The attacker constructs invalid packets, i.e. packets which incorrect IP fragment offsets,
overlapped fragments, which will cause the victim host network stack crash.
Ping Of Death - The attacker sends a large ICMP request (greater than 65535), and cause the victim
host network stack crash.
UDP Bomb - The attacker constructs UDP packets with invalid fields set, and cause the victim host
network stack crash.
Echo Chargen - The attacker sends lots of Echo Chargen request, and cause the victim host has no
memory for new requests.
74

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents