search
HomeSystem TutorialLINUXHow does SYN use the TCP protocol to launch attacks?

How does SYN use the TCP protocol to launch attacks?

Jul 27, 2024 am 08:24 AM
linuxlinux tutorialRed Hatlinux systemlinux commandlinux certificationred hat linuxlinux video

SYN attack is a common method used by hackers and is one of the methods of DDoS. SYN attacks exploit TCP protocol flaws by sending a large number of semi-connection requests, consuming CPU and memory resources. In addition to affecting hosts, SYN attacks can also harm network systems such as routers and firewalls. In fact, SYN attacks do not matter what system the target is, as long as these systems open TCP services, they can be implemented.

To understand the basic principles of this attack, we still need to start with the process of establishing a TCP connection:

Everyone knows that TCP is based on connections, that is to say: in order to transmit TCP data between the server and the client, a virtual link, that is, a TCP connection, must be established first. The standard process of establishing a TCP connection is as follows :

How does SYN use the TCP protocol to launch attacks?

In the first step, the requesting end (client) sends a TCP message containing the SYN flag. SYN means synchronization. The synchronization message will indicate the port used by the client and the initial sequence number of the TCP connection;

In the second step, after receiving the SYN message from the client, the server will return a SYN+ACK message, indicating that the client's request is accepted. At the same time, the TCP sequence number is increased by one, and ACK is confirmed.

In the third step, the client also returns a confirmation message ACK to the server. The TCP sequence number is also increased by one, and a TCP connection is completed.

The above connection process is called a three-way handshake in the TCP protocol.

The problem lies in the three-way handshake of the TCP connection. Suppose a user suddenly crashes or disconnects after sending a SYN message to the server. Then the server cannot receive the client's ACK message after sending a SYN+ACK response message. (The third handshake cannot be completed). In this case, the server will generally retry (send SYN+ACK to the client again) and wait for a period of time before discarding the unfinished connection. The length of this period is called SYN Timeout, generally speaking, this time is on the order of minutes (about 30 seconds-2 minutes).

It is not a big problem for a user to have an exception that causes a thread of the server to wait for 1 minute, but if a malicious attacker simulates this situation in large numbers, the server will consume a lot of money to maintain a very large semi-connection list. Many resources - tens of thousands of semi-connections. Even simple saving and traversing will consume a lot of CPU time and memory, not to mention the need to constantly retry SYN+ACK for the IPs in this list. .

In fact, if the server's TCP/IP stack is not powerful enough, the final result is often a stack overflow crash---even if the server-side system is powerful enough, the server-side will be busy processing the TCP connection requests forged by the attacker and will have no time to pay attention to the normal operations of the client. ask.

The above is the detailed content of How does SYN use the TCP protocol to launch attacks?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Top 5 Linux Tools for Monitoring Disk I/O PerformanceTop 5 Linux Tools for Monitoring Disk I/O PerformanceApr 27, 2025 pm 04:45 PM

This guide explores essential Linux tools for monitoring and troubleshooting disk I/O performance, a crucial metric impacting server speed and application responsiveness. Disk I/O performance directly affects how quickly data is read from and written

4 Ways to Find Plugged USB Device Name in Linux4 Ways to Find Plugged USB Device Name in LinuxApr 27, 2025 pm 04:44 PM

For new Linux users, identifying connected devices is crucial, especially USB drives. This guide provides several command-line methods to determine a USB device's name, essential for tasks like formatting. While USB drives often auto-mount (e.g., /

How to Fix 'No Space Left on Device” on Root (/) PartitionHow to Fix 'No Space Left on Device” on Root (/) PartitionApr 27, 2025 pm 04:43 PM

One of the most common problems with Linux systems, especially those with limited disk space, is the exhaustion of root partition (/) space. When this problem occurs, you may encounter the following error: No space left on device Don’t panic! This just means that your root directory (/partition) is full, which is a common problem, especially on systems with limited disk space or servers running 24/7. When this happens, you may encounter the following problems: The package cannot be installed or upgraded. System startup failed. The service cannot be started. Unable to write to logs or temporary files. This article walks you through practical steps to identify problems, clean up space safely, and prevent them from happening again. These instructions are suitable for beginners

Top 16 Notepad   Replacements for Linux in 2025Top 16 Notepad Replacements for Linux in 2025Apr 27, 2025 pm 04:42 PM

This article explores top-notch Notepad alternatives for Linux users. Notepad , while excellent on Windows, lacks a Linux version. This guide offers a diverse range of options to suit various needs and preferences. Top Notepad Alternatives for

How to Create and Run New Service Units in SystemdHow to Create and Run New Service Units in SystemdApr 27, 2025 pm 04:41 PM

Several days ago, I encountered a 32-bit CentOS 8 distribution and decided to test it on an older 32-bit system. Post-boot, I discovered a network connectivity issue; the connection would drop, requiring manual restoration after each reboot. This pr

How to Check for Bad Sectors on a Hard Disk in LinuxHow to Check for Bad Sectors on a Hard Disk in LinuxApr 27, 2025 pm 04:40 PM

Let's clarify what constitutes a bad sector or bad block: it's a portion of a hard drive or flash memory that's become unreadable or unwritable, typically due to physical damage to the disk surface or malfunctioning flash memory transistors. Accumul

How to Force cp Command to Overwrite Files Without PromptHow to Force cp Command to Overwrite Files Without PromptApr 27, 2025 pm 04:39 PM

The cp command, short for "copy," is a fundamental tool in Linux and other Unix-like systems for duplicating files and directories. While efficient for local file transfers, for network-based copies, scp (secure copy) is preferred due to i

Fix 'rm: Cannot Remove File – Device or Resource Busy” ErrorFix 'rm: Cannot Remove File – Device or Resource Busy” ErrorApr 27, 2025 pm 04:38 PM

When using the rm command to delete a file or directory in Linux system, if you encounter the following error: rm: cannot remove 'file-or-directory': Device or resource busy Don't worry, this is a common problem, which means that the file or directory you are trying to delete is currently being used by the system or running process. Cause of error The "Device or Resource Busy" message indicates that the file or directory is in use. To avoid damaging the system or causing data loss, Linux prevents deleting files in use. Common reasons include: Your terminal is currently in the directory you want to delete. The program or process is using the file or directory.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software