Explain why an attacker typically uses an ACK scan to bypass a firewall?

What will be an ideal response?


ACK scan-Attackers typically use ACK scans to get past a firewall or other filtering device. A filtering device looks for the SYN packet, the first packet in the three-way handshake, that the ACK packet was part of. Remember this packet order: SYN, SYN/ACK, and ACK. If the attacked port returns an RST packet, the packet filter was fooled, or there's no packet-filtering device. In either case, the attacked port is considered to be "unfiltered."

Computer Science & Information Technology

You might also like to view...

If you run out of disk space on your original hard disk, you can add a second hard drive inside the system unit or use a(n) ____.

A. external hard disk B. USB port C. internal flash drive D. capacity drive

Computer Science & Information Technology

The ________ operator matches text values by using wildcards

Fill in the blank(s) with correct word

Computer Science & Information Technology

By holding down the Alt key while selecting cells, you can select nonadjacent cells

Indicate whether the statement is true or false

Computer Science & Information Technology

Choose the correct pronoun in the following sentence.?The coach showed the trophy to my teammates and _________

A. ?I B. ?me

Computer Science & Information Technology