TCP – Playing with fake SYN packets /SYN Flood
In this video I demonstrate the basic concepts of a simple SYN Flood and how TCP responds. I show why spoofing the source IP not only allows an attacker to stay somewhat anonymous but also amplify the attack.
These are my custom Wireshark profiles for analyzing TCP segments.
Windows Profile:
http://bit.ly/2oMZlnX
Linux Profile:
http://bit.ly/2F7iY13 .
Comments are closed.