You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You
are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home
computer. Your company filters and monitors traffic that leaves from the internal network to the Internet.
How will you achieve this without raising suspicion?
Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP
address, Fred wants to try and trick this switch into thinking it already has established a session with his
computer. How can Fred accomplish this?
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a
source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an
ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP
three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the
destination host keeps track of connections waiting to be completed. This queue typically empties quickly since
the ACK is expected to arrive a few milliseconds after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?
You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are
redirected to a website seeking you to download free Anti-Virus software.
Dear valued customers,
We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total
security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link
below and enter your antivirus code:
Antivirus code: 5014
http://www.juggyboy/virus/virus.html
Thank you for choosing us, the worldwide leader Antivirus solutions.
Mike Robertson
PDF Reader Support
Copyright Antivirus 2010 All rights reserved
If you want to stop receiving mail, please go to:
http://www.juggyboy.com
or you may contact us at the following address: Media Internet Consultants, Edif. Neptuno, Planta Baja, Ave.
Ricardo J. Alfaro, Tumba Muerto, n/a Panama
How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?
Every company needs a formal written document which spells out to employees precisely what they are allowed
to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two
printed copies of the policy should be given to every employee as soon as possible after they join the
organization. The employee should be asked to sign one copy, which should be safely filed by the company. No
one should be allowed to use the company's computer systems until they have signed the policy in acceptance
of its terms.
What is this document called?