1 min read

Sys flood TCP/IP attack

As the title also says, it is an attack on the tcp/ip protocol. This occurs for various reasons such as poor control by the programmer of functions which fail by not controlling the input and with the increase in packet request.

The attacker floods the system with numerous requests or SYN packets using a non-existent IP as the address to send them, well at this point the stack fills up since the SYN/ACK response will never occur given the non-existent address and will bring a buffer and the server failure.

All connections enter a backlog queue with limited space so you can think of the numerous unanswered requests and the associated connection timeouts.

Depending on the type of operating system for example Linux uses syscookies to avoid these Sys flood attacks, this does nothing but record a potential attack, in fact determining a time interval and numerous requests without response from the origin address.

Attack on Titan 2: SamaGame analysis of the new Attack on Titan game

Attack on Titan: the trailer for the final episode of the anime has been released

Marvel’s Spider-Man 2: players attack a developer for the new model of MJ

Setting up Windows Defender attack protection in Windows 10

Configuring attack surface reduction in Windows 10

OAuth and OpenID vulnerable to “Timing Attack”

Don’t click on that! How to detect a phishing attack that pretends to be from a coworker

For just $10, a hacker can attack your business via RDP: Here’s how to stay safe

iTunes massive phishing attack

How CISOs can gain a better understanding of their cybersecurity attack surface