Upload
sandra4211
View
2.243
Download
6
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
2. Presentation Outline
3. IP Spoofing
4. IP / TCP
AB:SYN; my number is X BA:ACK; now X+1 SYN; my number is Y A B:ACK; now Y+1 5. A blind Attack
6. IP Spoofing Steps
7. IP Spoofing Attacks
8. Attacks
9. Attacks
10. Attacks
11. IP-Spoofing Facts
12. IP-Spoofing Counter-measures
13. No insecure authenticated services
14. Disable ping command
15. DOS using Ping 16. Use Encryption
17. Strengthen TCP/IP protocol
18. Firewall
19. Network layout with Firewall 20. IP Trace-back
21. Summary/Conclusion
22. References
23. Questions / Answers