What is IP Spoofing? Types of IP Spoofing

Posted at October 14, 2016 at 4:02 pm by Jithin

What is IP Spoofing Before discussing about IP spoofing, let's see take a look at IP addresses. An IP address is a unique set of numbers which separated with the full stops which is used to identify each computer using the Internet Protocol to communicate over a network. IP spoofing can be defined as an attacking technique where, the hacker pretends to be someone else is not as a trusted host and conceal his identity to gain access to a network and hijack the browsers. IP spoofing is also cal   [...]

Read More

What is SYN Flood attack and how to prevent it?

Posted at October 14, 2016 at 4:00 pm by Jithin

A SYN flood is a form of denial-of-service attack in which an attacker sends a progression of SYN requests to an objective's framework trying to consume enough server assets to make the framework inert to authentic activity.   TCP three-way handshake Typically, when a customer begins a TCP connection with a server, the customer and server trade a progression of messages which regularly runs this way: 1) The customer asks for a connection by sending a SYN (synchronize) message to   [...]

Read More

How to Troubleshoot a DDoS Attack?

Posted at September 8, 2016 at 6:28 pm by Jithin

What is a DDoS attack? DDoS stands for Distributed Denial of Service. It is a variant of the infamous DoS attack. A DoS attack is a type of attack that the attackers stops the service so that the legitimate users also cannot access the service.The attack will be from a single computer system.¬†This is achieved by sending excessive connection requests to a web server. Every server will have a limit on number of requests that can be handled at a time. When the number of requests exceeds this li   [...]

Read More