Ah, I see what's going on here. The SYN flood attack exploits the fact that when system B doesn't receive the final ACK, it's left in a 'half open' state, waiting for that packet. That's the key vulnerability that the attacker is targeting. I think I've got this one figured out.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Karol
6 months agoLauna
6 months agoAileen
6 months agoNickole
6 months agoKristofer
7 months agoShayne
7 months agoGregg
7 months agoJade
7 months ago