1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
2 years ago
15

if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?

Computers and Technology
1 answer:
goldfiish [28.3K]2 years ago
7 0

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

  • SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake.
  • TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functional
  • With TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

brainly.com/question/14739766

You might be interested in
Which formatting options can be changed by selecting the Design tab? Check all that apply.
alexgriva [62]

Answer:

Layout

Smartart Styles

WordArt Styles

5 0
3 years ago
Read 2 more answers
Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
tigry1 [53]

Answer:

for a) the time required is 228488.5 seconds= 63.469 hours

for b) the time required is 54 seconds

Explanation:

for a) since each combination is equally probable , then the number of possible combinations is

CT=Combinations = number of characters^length of password = 26⁴

then the number of combinations at time t will be the total , less the ones already tried:

Ct = CT - (n-1) , since n=α*t  → Ct=CT-α*t  

since each combination is equally probable , then the probability to succeed  

pt = 1/Ct = 1/ (CT- α*t +1)

but the probability of having a success in time t , means also not succeeding in the previous trials , then

Pt = pt*П(1-pk), for k=1 to t-1

Pt = 1/ (CT- α*t +1) П[1-1/ (CT- α*k +1)] = 1/ (CT- α*t +1) П[(CT- α*k )] /(CT- α*k +1)]  

since α=1 ,  

Pt = 1/ (CT- t +1) П[(CT- k )] /(CT- k +1)] = 1/ (CT- t +1)  * [CT- (t-1) ]/CT  =  1/CT

then the expected value of the random variable t= time to discover the correct password is

E(t) = ∑ t* Pt = ∑ t *1/CT , for t=1 until t=CT/α =CT

E(t) = ∑ t *(1/CT) = (1/CT) ∑ t = (1/CT) * CT*(CT+1)/2 = (CT+1)/2

therefore

E(t) = (CT+1)/2 = (26⁴ +1)/2 = 228488.5 seconds = 63.469 hours

for b)

time required = time to find character 1 + time to find character 2 +time to find character 3 +time to find character 4 = 4*time to find character

since the time to find a character is the same case as before but with CT2=Combinations = 26 ,then

t= 4*tc

E(t) = 4*E(tc) = 4*(CT2+1)/2 = 4*(26+1)/2 = 54 seconds

6 0
4 years ago
Draw and implement of an organization which have 125 employees. use the following features 1.email services 2.lan communication
Dimas [21]

An organisation usually hires employees which helps in the successful achievement of the goals of the organisation.

<h3>Implementation of an organisation</h3>

The implementation of an organisation can be carried out using the following features:

  • Email services: Email address can be assigned to different employees of the organisation.

  • LAN communication: Local Area Network is used by organisation to connect their computer devices to a server using a common communication line.

  • VLAN: This is known as Virtual Local Area Network which is created between two LAN's.

  • Security: This is set up by a company to guide their data from theft.

  • Storage: This is used by the organisation to store their data.

  • Server: This is a device that provides internet services to another computer in an organisation.

Learn more about LAN here:

brainly.com/question/26956118

#SPJ4

3 0
2 years ago
In the relocatable dynamic partitions scheme, the Memory Manager relocates programs to gather together all of the empty blocks a
kodGreya [7K]

Answer:

True

Explanation:

In computer, Memory management is a form of resource management, its essential requirement is to provide ways to dynamically allocate portions of memory to programs at their request, and to free it to be used again when not needed. Memory management is critical to any advanced computer system that uses more than a single process.

Several methods that has increased effectiveness of memory management like the Virtual memory systems which separates the memory addresses used by a process from actual physical addresses, thus allowing the separation of processes and increasing the size of the virtual address space beyond the available amount of Random Access Memory (RAM) using paging or swapping to secondary storage have been used.

"The Memory Manager relocates programs to gather together all of the empty blocks and compact them to make one block of memory large enough to accommodate some or all of the jobs waiting to get in from your question.

6 0
3 years ago
In an image citation, what piece of information is listed first?
kondaur [170]
In a image citation the piece of information listed first is "last name"
can you give us multiple choice?
7 0
3 years ago
Other questions:
  • Which is the lowest Complexity"
    15·1 answer
  • The user interface design principle that places an emphasis on the intuitive flow of the interface (i.e. left to right and top t
    12·1 answer
  • Materials such as copper, silver, and aluminum through which electric energy passes freely are called
    13·1 answer
  • Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po
    6·2 answers
  • A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
    5·2 answers
  • What command would Emile use in his word processing software to insert a bar chart that will automatically adjust to changes mad
    6·2 answers
  • Which three statements are true of lossless compression?
    6·1 answer
  • If a student ate 3/4 (three-fourths) of their meals away from home, what % of the total day is spent eating other than at home?
    11·1 answer
  • O
    14·1 answer
  • David is preparing a report to show the percentage increase in population in the United States in the last five years. Which fea
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!