Talk:Denial of Service Methods: Difference between revisions
From /i/nsurgency W/i/ki
Jump to navigationJump to search
→Bad TCP handshake picture.: new section |
|||
Line 6: | Line 6: | ||
The picture depicts the following: | The picture depicts the following: | ||
Client --- SYN --> Server | Client --- SYN --> Server | ||
Client <-- SYN/ACK --- Server | Client <-- SYN/ACK --- Server | ||
Client --- RST --> Server | Client --- RST --> Server | ||
Firstly, RST is NOT part of the handshake. The handshake STARTS the connection. RST ends the connection. | Firstly, RST is NOT part of the handshake. The handshake STARTS the connection. RST ends the connection. | ||
Secondly, RST is sent by either the server or the client. | Secondly, RST is sent by either the server or the client. | ||
Thirdly, and most importantly, the TCP handshake ends with | Thirdly, and most importantly, the TCP handshake ends with | ||
Client --- ACK --> Server | Client --- ACK --> Server | ||
Without this you will not be connected. If this step did not exist, you could create millions of full TCP connections from spoofed IPs (provided they were dead IPs). | Without this you will not be connected. If this step did not exist, you could create millions of full TCP connections from spoofed IPs (provided they were dead IPs). |
Revision as of 05:18, 22 April 2009
someone needs to re-upload the images to this site, external images are turned off.
I've uploaded and put in all the images now. Hopefully it's all working okay. - Lyle 18:50, 16 March 2009 (UTC)
Bad TCP handshake picture.
The picture depicts the following:
Client --- SYN --> Server
Client <-- SYN/ACK --- Server
Client --- RST --> Server
Firstly, RST is NOT part of the handshake. The handshake STARTS the connection. RST ends the connection.
Secondly, RST is sent by either the server or the client.
Thirdly, and most importantly, the TCP handshake ends with
Client --- ACK --> Server
Without this you will not be connected. If this step did not exist, you could create millions of full TCP connections from spoofed IPs (provided they were dead IPs).