How can you stop a continuous ACK transfer by resynchronizing the client and server?

What will be an ideal response?


Resynchronizing the actual trusted computer with the victim server is performed because both computers have information regarding the quantity of packets that must be transferred. Whenever the hacker inserts additional packets to the stream of data between the actual client and the server, the victim server receives more packets than the trusted client actually sent. To avoid the loop of ACK packets between the client and the host, the hacker should synchronize the number of packets that are sent, which leads both valid members of the session to believe that the packet count is right. If this is done correctly, there will be no ACK storm because neither the trusted computer nor the victim will have too high or too low of a packet count. The hijack will be a complete success and the malicious code transfer from the attacker's machine will be considered a success.

Computer Science & Information Technology

You might also like to view...

To pass an object of class person to a function as a formal value parameter most efficiently you should use:

a) person p b) const person p c) person& p d) const person& p

Computer Science & Information Technology

Project 2010 provides a way to show project costs as a budget and then to compare expected progress with actual progress, in a process called negative variance analysis.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Before distributing a custom application, you should first ________ its functionality

A) test B) protect C) document D) deactivate

Computer Science & Information Technology

If any task along a critical path falls behind schedule, the entire project will be delayed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology