As TCP/IP is the basic protocol of the Internet, it is necessary to improve the TCP/IP protocol. From the beginning, the TCP/IP protocol did not take into account so many threats on the current network, resulting in many different types of attack methods, which are generally aimed at protocol principles (especially DDOS) attacks) we are powerless. The common principles of TCP/IP attacks are described as follows:
(1) Source Address Spoofing, IP Spoofing, and DNS Spoofing ). the basic principle is that the IP address is not fixed with the MAC address at the time of the factory. The attacker uses a self-sealing package and modifies the IP address of the network node to impersonate the IP address of a trusted node for attacks. There are three main methods:
1. Paralyzing trusted hosts with real IP addresses, disguising trusted hosts to attack servers;
2. Man-in-the-middle attack;
3. DNS Spoofing and Session Hijack );
(2) Source Routing Spoofing ). Principle: The IP Source Routing option in the IP data packet is used to specify the route, and trusted users are used to attack the server, especially because the UDP protocol is not connected, it is easier to be exploited for attacks;
(3) RIP Attacks ). Principle: attackers publish fake routing information on the Internet, and then use ICMP redirection to spoof server routers and hosts, and Mark normal routers as invalid, so as to achieve the purpose of attacks.
(4) TCP serial Number Spoofing and Attack (TCP Sequence Number Spoofing and Attack:
1. forge the TCP serial number, construct a disguised TCP packet, and attack trusted hosts on the network;
2. SYN Attack (SYN Attack ). There are many patterns in this type of attack. However, the principle is basically the same, making the TCP protocol unable to complete the three-way handshake protocol;
3. Teardrop Attack and Land Attack ). Principle: The system is used to receive IP data packets, and the vulnerability of the packet length and offset is not strict.
Related Articles]
- TCP/IP protocol principles
- TCP/IP protocol processing is changed from "soft" to "hard"
- Three-way handshake of TCP/IP protocol and its implementation principle