You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using GIACing2 utility. This attack is known as __________.
I'm not totally sure about this one, but I'll give it my best shot. I'll eliminate any answer choices that don't seem to fit the details, and then make an educated guess from the remaining options.
This looks tricky, but I'm confident I can figure it out. I just need to recall the different port scanning approaches we covered and apply that knowledge to determine the right answer.
Okay, I've got a strategy - I'll carefully read through the answer choices and think about which one best matches the details provided in the question. The key is to understand the specific technique being referenced.
Hmm, I'm a bit confused by the specific details about the TTL and GIACing2 utility. I'll need to make sure I understand how those factors relate to the attack being described.
I think this is asking about a type of port scanning technique, so I'd start by reviewing my notes on different port scanning methods and their characteristics.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Ty
3 days agoVeronica
8 days agoYaeko
13 days agoTiffiny
18 days agoCherilyn
24 days agoKristel
29 days agoGerald
1 month agoNoble
1 month agoWilburn
1 month agoMicaela
2 months agoLaurene
2 months agoKassandra
2 months ago