User Guide
Page 140
...fragmented) IP packet." The Teardrop program creates a series of IP fragments with useless data. 4 IP Spoofing. 5 "Ping of Death" and "Teardrop" attacks exploit bugs in the TCP/IP implementations of various computer and host systems. • Ping of Death uses a "ping" utility to create an IP packet that... the handshake that initiates a communication session between two applications. The oversize packet is then sent to "SYN Flood" and "LAND" attacks. P-660HW-T v2 User's Guide Some of the most common IP ports are: Table 48 Common IP Ports 21 FTP 53 23 Telnet 80 25 SMTP 110 DNS...
...fragmented) IP packet." The Teardrop program creates a series of IP fragments with useless data. 4 IP Spoofing. 5 "Ping of Death" and "Teardrop" attacks exploit bugs in the TCP/IP implementations of various computer and host systems. • Ping of Death uses a "ping" utility to create an IP packet that... the handshake that initiates a communication session between two applications. The oversize packet is then sent to "SYN Flood" and "LAND" attacks. P-660HW-T v2 User's Guide Some of the most common IP ports are: Table 48 Common IP Ports 21 FTP 53 23 Telnet 80 25 SMTP 110 DNS...