Analysis and Summary of TCP/IP attack principles

Source: Internet
Author: User
Tags dns spoofing

As TCP/IP is the basic protocol of the Internet, it is necessary to improve the TCP/IP protocol. From the beginning, the TCP/IP protocol did not take into account so many threats on the current network, resulting in many different types of attack methods, which are generally aimed at protocol principles (especially DDOS) attacks) we are powerless. The common principles of TCP/IP attacks are described as follows:

(1) Source Address Spoofing, IP Spoofing, and DNS Spoofing ). the basic principle is that the IP address is not fixed with the MAC address at the time of the factory. The attacker uses a self-sealing package and modifies the IP address of the network node to impersonate the IP address of a trusted node for attacks. There are three main methods:

1. Paralyzing trusted hosts with real IP addresses, disguising trusted hosts to attack servers;

2. Man-in-the-middle attack;

3. DNS Spoofing and Session Hijack );

(2) Source Routing Spoofing ). Principle: The IP Source Routing option in the IP data packet is used to specify the route, and trusted users are used to attack the server, especially because the UDP protocol is not connected, it is easier to be exploited for attacks;

(3) RIP Attacks ). Principle: attackers publish fake routing information on the Internet, and then use ICMP redirection to spoof server routers and hosts, and Mark normal routers as invalid, so as to achieve the purpose of attacks.

(4) TCP serial Number Spoofing and Attack (TCP Sequence Number Spoofing and Attack:

1. forge the TCP serial number, construct a disguised TCP packet, and attack trusted hosts on the network;

2. SYN Attack (SYN Attack ). There are many patterns in this type of attack. However, the principle is basically the same, making the TCP protocol unable to complete the three-way handshake protocol;

3. Teardrop Attack and Land Attack ). Principle: The system is used to receive IP data packets, and the vulnerability of the packet length and offset is not strict.

Related Articles]

  • TCP/IP protocol principles
  • TCP/IP protocol processing is changed from "soft" to "hard"
  • Three-way handshake of TCP/IP protocol and its implementation principle

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.