Which attack type exploits the second stage of the TCP three-way handshake by sending numerous SYN-ACK packets to exhaust server resources?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which attack type exploits the second stage of the TCP three-way handshake by sending numerous SYN-ACK packets to exhaust server resources?

Explanation:
The attack hinges on the TCP handshake stage where the server has already replied with a SYN-ACK and is waiting for the final ACK from the client. In a SYN-ACK flood, the attacker overwhelms the target by causing a large number of SYN-ACK responses to be sent, typically by using spoofed client addresses. Each SYN received by the server triggers state to be allocated for a half-open connection until the final ACK arrives. If many such SYN-ACKs are sent and no corresponding ACKs come, the server’s backlog or connection-tracking resources fill up, preventing legitimate clients from establishing new connections. This directly targets the second stage of the handshake—the server’s SYN-ACK—making it the best fit. The other options describe different ideas: a fragmentation attack exploits IP fragmentation, a standard SYN flood targets the initial SYN message, and a variant described as a spoofed session flood is less specific in how it phrases the second-stage flood.

The attack hinges on the TCP handshake stage where the server has already replied with a SYN-ACK and is waiting for the final ACK from the client. In a SYN-ACK flood, the attacker overwhelms the target by causing a large number of SYN-ACK responses to be sent, typically by using spoofed client addresses. Each SYN received by the server triggers state to be allocated for a half-open connection until the final ACK arrives. If many such SYN-ACKs are sent and no corresponding ACKs come, the server’s backlog or connection-tracking resources fill up, preventing legitimate clients from establishing new connections.

This directly targets the second stage of the handshake—the server’s SYN-ACK—making it the best fit. The other options describe different ideas: a fragmentation attack exploits IP fragmentation, a standard SYN flood targets the initial SYN message, and a variant described as a spoofed session flood is less specific in how it phrases the second-stage flood.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy