Respuesta :

When we talk about TCP/IP, we are talking about a protocol suite designed as a layered approach and used to interconnect computing devices across the entire continent. Internet Protocol (IP) is like the epitome protocol of the entire TCP/IP protocol suite and helps in the delivery of services. This IP is encapsulated into an IP header before your message is sent. Having briefly discussed about the IP protocol and the encapsulation, here is where typical TCP/IP attacks occur.

Explanation:

  • IP address spoofing – As mentioned above, IP is encapsulated into packet headers and inside of those headers are information such as IP source and destination addresses. IP source and destination addresses are needed by the routers to determine the best route path. If hackers can get access to the IP layer, they could easily spoof the source address and somehow make it pretend as if it was another legit host.
  • TCP sequence number prediction attack– This is very common. TCT/IP protocol suite contains a three way handshake. For instance, when you do a web search, what is happening is that you are sending information to the server. The server will receive this info and send an acknowledgment receipt with the information it received back to you. You will then send an acknowledgment message to the server and communication will be established. In between this handshake, there is a sequence number called ISN that hackers are able to predict from their own host computers, and this sequence number could send malicious packets to impersonate another source host on a network.
  • Port Scanning – It is not a technique used to directly launch an attack. However, hackers can use port scanning to scan a target network for exploitable open ports or listening servers.

Learn more about cyber security

https://brainly.com/question/10889739

https://brainly.com/question/11111886

https://brainly.com/question/8603826

#LearnWithBrainly

Otras preguntas