Across
- 3. Sending a packet that is too large and can shut down a target machine.
- 5. This scan sends a ping to the target post.
- 10. A network-vulnerability scanner
- 11. The process of attempting to contact each network port on the target system to see which ones are open.
- 12. involves altering the TCP stack on the server so that it will take less time to timeout when a SYN connection is left incomplete.
- 13. Attack that come in two forms: floods and nukes.
- 18. The process of finding out what is on the target system.
Down
- 1. This type of scripting injects client-side scripts into web pages viewed by other users.
- 2. German for barbed wire, is a DDoS attack tool that combines features Trinoo with the source code from the TFN tool.
- 4. A very old Windows method of network communication still used to communicate with Linux machines.
- 5. This type of scanning technique does not require the attacker to connect directly to the target system.
- 6. This type of scan makes a complete connection with the target system and is most likely going to be detected quickly.
- 7. Checking to see if a system is vulernable to specific attacks.
- 8. A very stealthy scan, also called the half-open scan.
- 9. Blocking these packets from outside your network is a great defense against a Dos/DDos.
- 12. Sending a stream of SYN packets hen never respond, thus leaving the connection half open.
- 14. This is a number generated from a string of text.
- 15. Works by simply allocating a micro-record instead of alloacatin a complete connection object to the SYN object.
- 16. The attacker sends a forged packet with the same IP address and destination IP address.
- 17. A very popular tool for cracking Windows passwords.
