Answer to Question #296125 in Computer Networks for kitty ku

Question #296125

. Which of the following is correct as part of DDos-attack (shown in class) ?

a. netsox 76 -i 10.0.2.6 -p 23 -s raw

b. netfox 76 -i 10.0.2.6 -p 23 -s raw

c. netwox 76 -i 10.0.2.6 -p 23 -s raw

d. netvox 76 -i 10.0.2.6 -p 23 -s raw


1
Expert's answer
2022-02-12T08:22:25-0500

The correct as is c since netwox 76 tool is used for a SYN flood attack. It is among one of the tools of the netwox(short for networking toolbox). This tool works by sending a flood of TCP SYN packets to a system. For instance to check or test how a firewall responds when it receives rogue TCP SYN packets that have to be ignored.

The -i shows the destination IP address and the -p shows destination port and the -s parameter defines which IP spoof initialization type to use in this case it's the raw type to generate link layer for spoofing.


Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS