Talk:Denial of Service Methods: Difference between revisions
>Hitlerlol Created page with 'someone needs to re-upload the images to this site, external images are turned off.' |
>Pseudonymous m Article Rewrite Suggestion |
||
(10 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
someone needs to re-upload the images to this site, external images are turned off. | someone needs to re-upload the images to this site, external images are turned off. | ||
I've uploaded and put in all the images now. Hopefully it's all working okay. - Lyle 18:50, 16 March 2009 (UTC) | |||
== Bad TCP handshake picture. == | |||
The picture depicts the following: | |||
Client --- SYN --> Server | |||
Client <-- SYN/ACK --- Server | |||
Client --- RST --> Server | |||
Firstly, RST is NOT part of the handshake. The handshake STARTS the connection. RST ends the connection. | |||
Secondly, RST is sent by either the server or the client. | |||
Thirdly, and most importantly, the TCP handshake ends with | |||
Client --- ACK --> Server | |||
Without this you will not be connected. If this step did not exist, you could create millions of full TCP connections from spoofed IPs (provided they were dead IPs). | |||
==This article needs to be REWRITTEN== | |||
It is apparent that this article is a stagnant, festering amalgam of snippets of edits, many of which have not been truly beneficial to the whole. Whether intentionally or unintentionally, this article has garnered my attention from this status. | |||
I will post a rewrite plan to this discussion page within a few days. I hope it will guide someone (Myself, if it comes down to it) when this article is recomposed. |
Latest revision as of 07:14, 5 July 2010
someone needs to re-upload the images to this site, external images are turned off.
I've uploaded and put in all the images now. Hopefully it's all working okay. - Lyle 18:50, 16 March 2009 (UTC)
Bad TCP handshake picture.[edit]
The picture depicts the following:
Client --- SYN --> Server
Client <-- SYN/ACK --- Server
Client --- RST --> Server
Firstly, RST is NOT part of the handshake. The handshake STARTS the connection. RST ends the connection.
Secondly, RST is sent by either the server or the client.
Thirdly, and most importantly, the TCP handshake ends with
Client --- ACK --> Server
Without this you will not be connected. If this step did not exist, you could create millions of full TCP connections from spoofed IPs (provided they were dead IPs).
This article needs to be REWRITTEN[edit]
It is apparent that this article is a stagnant, festering amalgam of snippets of edits, many of which have not been truly beneficial to the whole. Whether intentionally or unintentionally, this article has garnered my attention from this status. I will post a rewrite plan to this discussion page within a few days. I hope it will guide someone (Myself, if it comes down to it) when this article is recomposed.