Talk:Denial of Service Methods: Difference between revisions

From /i/nsurgency W/i/ki
Jump to navigationJump to search
>Lyle
No edit summary
Line 2: Line 2:


I've uploaded and put in all the images now. Hopefully it's all working okay. - Lyle 18:50, 16 March 2009 (UTC)
I've uploaded and put in all the images now. Hopefully it's all working okay. - Lyle 18:50, 16 March 2009 (UTC)
== Bad TCP handshake picture. ==
The picture depicts the following:
Client --- SYN --> Server
Client <-- SYN/ACK --- Server
Client --- RST --> Server
Firstly, RST is NOT part of the handshake. The handshake STARTS the connection. RST ends the connection.
Secondly, RST is sent by either the server or the client.
Thirdly, and most importantly, the TCP handshake ends with
Client --- ACK --> Server
Without this you will not be connected. If this step did not exist, you could create millions of full TCP connections from spoofed IPs (provided they were dead IPs).

Revision as of 05:18, 22 April 2009

someone needs to re-upload the images to this site, external images are turned off.

I've uploaded and put in all the images now. Hopefully it's all working okay. - Lyle 18:50, 16 March 2009 (UTC)

Bad TCP handshake picture.

The picture depicts the following: Client --- SYN --> Server Client <-- SYN/ACK --- Server Client --- RST --> Server

Firstly, RST is NOT part of the handshake. The handshake STARTS the connection. RST ends the connection. Secondly, RST is sent by either the server or the client. Thirdly, and most importantly, the TCP handshake ends with Client --- ACK --> Server

Without this you will not be connected. If this step did not exist, you could create millions of full TCP connections from spoofed IPs (provided they were dead IPs).