What is the Three-way handshake? How can it be used to create a DOS attack?
Answer / chaitanya
The three-way handshake is a cornerstone of the TCP suite: SYN, SYN/ACK, ACK. SYN is the outgoing connection request from client to server. ACK is the acknowledgement of the server back to the client, saying that yes I hear you, let’s open a connection. SYN/ACK is the final connection, and allows the two to speak. The problem is that this can be used as a very basic type of Denial of Service Attack. The client opens up the SYN connection, the server responds with the SYN/ACK, but then the client sends another SYN. The server treats this as a new connection request and keeps the previous connection open. As this is repeated over and over many times very quickly, the server quickly becomes saturated with a huge number of connection requests, eventually overloading its ability to connect to legitimate users.
| Is This Answer Correct ? | 3 Yes | 1 No |
You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?
A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?
How would you find out what a POST code means?
What is your opinion on hacktivist groups such as Anonymous?
You see a user logging in as root to perform basic functions. Is this a problem?
What is data source in computer?
How would you login to Active Directory from a Linux or Mac box?
What is SSL and why is it not enough when it comes to encryption?
What is the difference between closed-source and open-source? Which is better?
How would you judge if a remote server is running IIS or Apache?
You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?
Why would you bring in an outside contractor to perform a penetration test?