2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet698/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   694   695   696   697   698   699   700   701   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Ping of Death

ping-of-death attack
employs an oversized ping packet. Ping packets are normally 32 or 
64 bytes, though different operating systems can use other sizes. The ping-of-death attack 
changed the size of ping packets to over 64 KB, which was bigger than many systems could 
handle. When a system received a ping packet larger than 64 KB, it resulted in a problem. 
In some cases the system crashed. In other cases, it resulted in a buffer overflow error. A 
ping-of-death attack is rarely successful today because patches and updates remove the 
vulnerability.


752
Chapter 17 

Preventing and Responding to Incidents
Although the ping of death isn’t a problem today, many other types of 
attacks cause buffer overflow errors (discussed in Chapter 21). When ven-
dors discover bugs that can cause a buffer overflow, they release patches 
to fix them. One of the best protections against any buffer overflow attack 
is to keep a system up-to-date with current patches. Additionally, produc-
tion systems should not include untested code or allow the use of system 
or root-level privileges from applications.
Teardrop 
In a
teardrop attack
, an attacker fragments traffi c in such a way that a system is unable to 
put data packets back together. Large packets are normally divided into smaller fragments 
when they’re sent over a network, and the receiving system then puts the packet fragments 
back together into their original state. However, a teardrop attack mangles these pack-
ets in such a way that the system cannot put them back together. Older systems couldn’t 
handle this situation and crashed, but patches resolved the problem. Although current 
systems aren’t susceptible to teardrop attacks, this does emphasize the importance of keep-
ing systems up-to-date. Additionally, intrusion detection systems can check for malformed 
packets.
Land Attacks 
A
land attack
occurs when the attacker sends spoofed SYN packets to a victim using the 
victim’s IP address as both the source and destination IP address. This tricks the system 
into constantly replying to itself and can cause it to freeze, crash, or reboot. This attack 
was fi rst discovered in 1997, and it has resurfaced several times attacking different ports. 
Keeping a system up-to-date and fi ltering traffi c to detect traffi c with identical source and 
destination addresses helps to protect against LAND attacks.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   694   695   696   697   698   699   700   701   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish