Ah, I see what's going on here. The SYN flood attack exploits the fact that when system B doesn't receive the final ACK, it's left in a 'half open' state, waiting for that packet. That's the key vulnerability that the attacker is targeting. I think I've got this one figured out.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Karol
4 months agoLauna
4 months agoAileen
4 months agoNickole
5 months agoKristofer
5 months agoShayne
5 months agoGregg
5 months agoJade
5 months ago