Talk:Denial of Service Methods

From /i/nsurgency W/i/ki
Revision as of 07:14, 5 July 2010 by >Pseudonymous (Article Rewrite Suggestion)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

someone needs to re-upload the images to this site, external images are turned off.

I've uploaded and put in all the images now. Hopefully it's all working okay. - Lyle 18:50, 16 March 2009 (UTC)

Bad TCP handshake picture.[edit]

The picture depicts the following:

Client --- SYN --> Server

Client <-- SYN/ACK --- Server

Client --- RST --> Server


Firstly, RST is NOT part of the handshake. The handshake STARTS the connection. RST ends the connection.

Secondly, RST is sent by either the server or the client.

Thirdly, and most importantly, the TCP handshake ends with

Client --- ACK --> Server

Without this you will not be connected. If this step did not exist, you could create millions of full TCP connections from spoofed IPs (provided they were dead IPs).

This article needs to be REWRITTEN[edit]

It is apparent that this article is a stagnant, festering amalgam of snippets of edits, many of which have not been truly beneficial to the whole. Whether intentionally or unintentionally, this article has garnered my attention from this status. I will post a rewrite plan to this discussion page within a few days. I hope it will guide someone (Myself, if it comes down to it) when this article is recomposed.