Sprzęt tu on raczej ważny nie jest!
Firewall po raz 3 Outpost brak ftp www i innych tym podobnych serwerów
System nowy wgrany system od zera.
Po czym poznaje po sygnalizacji firewalla i nazwie przeprowadzonego ataku.
Short Fragments This
attack takes advantage of the usual behavior of IP packets that are too large and split into multiple fragments. The kernel then reassembles all the fragments to get a full packet. This attack sends a fragment of a packet that is too short even to contain a header, which causes a system crash after "assembly".
Fragmented ICMP This
attack uses a vulnerability in Microsoft's implementation of TCP/IP and was popular a while back.
By sending ICMP packets as a number of fragments that were modified so they exceeded 1472 bytes after assembly by a Windows 95, 98, NT, or 2000 machine, it was possible to disrupt normal operations varying from slowing performance to crashing the operating system. A series of fragmented ICMP packets causes the TCP/IP stack of the affected system to improperly gain access to invalid segments of the computer's memory, which either causes some services to fail (denial of service) or the machine to crash altogether.
Today this attack is not generally relevant, but receiving such packets can signify that someone is scanning your system to ascertain primary vulnerabilities. Sometimes administrators can use fragmented ICMP packets for testing network efficiency and its capability of transferring large packets. For example, the following command can result in detecting an attack:
ping IPaddress -l 65500.
There are several varieties of this class of attack, for example:
JOLT2, a denial-of-service attack that utilizes a continuous stream of identical, fragmented IP packets to consume most or all of the operating system's CPU resources. Most Windows operating systems are vulnerable to this attack, because of a flaw in each operating system's method of IP fragment reassembly.
TARGA3, sends random malformed IP packets that cause some IP stacks to crash or act unexpectedly. Malformed IP packets consist of invalid fragmentation, protocol, packet size, header values, options, offsets, TCP segments, and/or routing flags. When the TCP stack receives an invalid packet, the kernel has to allocate resources to handle the packet. If enough malformed packets are received, the system can crash from exhausted resources.
Quote: i przede wszystkim cracker to osoba która lamię zabezpieczenia w programach grach itp,
osoba która włamuje sie do systemów/komputerów to hacker
Widzisz a ja mam swoja wersje ze stronki i się jej będę trzymał.