Chapter 8 Crossword

123456789101112131415161718
Across
  1. 3. Sending a packet that is too large and can shut down a target machine.
  2. 5. This scan sends a ping to the target post.
  3. 10. A network-vulnerability scanner
  4. 11. The process of attempting to contact each network port on the target system to see which ones are open.
  5. 12. involves altering the TCP stack on the server so that it will take less time to timeout when a SYN connection is left incomplete.
  6. 13. Attack that come in two forms: floods and nukes.
  7. 18. The process of finding out what is on the target system.
Down
  1. 1. This type of scripting injects client-side scripts into web pages viewed by other users.
  2. 2. German for barbed wire, is a DDoS attack tool that combines features Trinoo with the source code from the TFN tool.
  3. 4. A very old Windows method of network communication still used to communicate with Linux machines.
  4. 5. This type of scanning technique does not require the attacker to connect directly to the target system.
  5. 6. This type of scan makes a complete connection with the target system and is most likely going to be detected quickly.
  6. 7. Checking to see if a system is vulernable to specific attacks.
  7. 8. A very stealthy scan, also called the half-open scan.
  8. 9. Blocking these packets from outside your network is a great defense against a Dos/DDos.
  9. 12. Sending a stream of SYN packets hen never respond, thus leaving the connection half open.
  10. 14. This is a number generated from a string of text.
  11. 15. Works by simply allocating a micro-record instead of alloacatin a complete connection object to the SYN object.
  12. 16. The attacker sends a forged packet with the same IP address and destination IP address.
  13. 17. A very popular tool for cracking Windows passwords.