What is the Three-way handshake? How can it be used to create a DOS attack?



What is the Three-way handshake? How can it be used to create a DOS attack?..

Answer / chaitanya

The three-way handshake is a cornerstone of the TCP suite: SYN, SYN/ACK, ACK. SYN is the outgoing connection request from client to server. ACK is the acknowledgement of the server back to the client, saying that yes I hear you, let’s open a connection. SYN/ACK is the final connection, and allows the two to speak. The problem is that this can be used as a very basic type of Denial of Service Attack. The client opens up the SYN connection, the server responds with the SYN/ACK, but then the client sends another SYN. The server treats this as a new connection request and keeps the previous connection open. As this is repeated over and over many times very quickly, the server quickly becomes saturated with a huge number of connection requests, eventually overloading its ability to connect to legitimate users.

Is This Answer Correct ?    3 Yes 1 No

Post New Answer

More Computer Security Interview Questions

What is database in a computer?

0 Answers  


What are the three ways to authenticate a person?

1 Answers  


 Why would you want to use SSH from a Windows pc?

1 Answers  


 What is the difference between a vulnerability and an exploit?

1 Answers  


How would you permanently remove the threat of data falling into the wrong hands?

1 Answers  






How many security protocols available?

1 Answers  


How would you judge if a remote server is running IIS or Apache?

2 Answers  


What are accessories in computer?

0 Answers  


 What is the difference between Information Protection and Information Assurance?

1 Answers  


You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 Answers  


What’s the difference between Symmetric and Asymmetric encryption?

1 Answers  


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?

0 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)