First page Back Continue Last page Summary Graphic
A Survey of Vulnerability and Attacks
TCP/IP Attack
Taking advantage of the way Transmission Control Protocol (TCP) works, may lead to a variety of attacks such as:
Session Hijacking
- Whenever a user assumes control of a network session or connection (desynchronization).
Denial of Service (DoS)
- Any activity which prevents the normal use of system and network resources such as those services listed in /etc/inetd.conf