The function tcp_output is called, which outputs the SYN packet onto the network.
调用函数tcp _ output,将SY n包输出到网络。
The outbound SYN packet from each host creates the necessary NAT state for its own NATs.
从各自的主机外出的SYN包,为他们自己的NAT产生可能的NAT状态。
Attacker sends a TCP SYN packet to the target port from his own IP address (or one he controls) to request a connection.
攻击者从自己的的IP地址(或者他控制的)发送一个TCPSYN攻击或者自己包到目标端口请求连接。
When the client issues connect, the tcp_output function is called at the protocol layer, which outputs the SYN packet onto the interface.
当客户端发布connect时,在协议层调用tcp _ out put函数,将SY n包输出到接口。
The interface on the destination (the server) receives the incoming SYN packet, places it on the ipintrq queue, and raises a software interrupt.
目的地(服务器)上的接口接收传入syn包,将其放在ipintrq队列中,并引发软件中断。
The problem that can occur with TCP is when a rogue client forges an IP packet with a bogus source address, then floods a server with TCP SYN packets.
当恶意客户机使用虚假的源地址来伪造一个IP报文时,TCP就会出现问题了,这会大量 TCPSYN报文攻击服务器。
tcp_input() executes at the s/w interrupt, and picks up the SYN packet from ipintrq, processes it, and places the partially completed socket connection in an incomplete socket queue.
tcp_input()在s/w中断时执行,并从ipintrq 拾取SYN包,对其进行处理,并将部分完成的套接字连接放入完成的套接字队列。
To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.
要实现这一点,攻击者向目标主机发送设置了SYN标志的tcp包,就象打开常规tCP连接时一样。
This means a TCP packet with the SYN flag set is sent to the server.
这意味着向服务器发送一个设置了SYN标志的tcp包。
A client initiates a connection to a host (and a specific port) by sending a syn synchronize packet.
客户机通过发送syn同步数据包发起到一个主机(和特定端口)的连接。
When a new TCP connection comes in from a client by means of a packet with the SYN bit set, the server creates an entry for the half-open connection and responds with a SYN-ACK packet.
当从客户机发来新的TCP连接时,数据包设置了SY n位,服务器就为这个半开的连接创建一个条目,并用一个SYN -ACK数据包进行响应。
The server answers with a packet where both the SYN and ACK flags are set.
服务器以设置了 SYN和ACK 标志的包应答。
An attack called the SYN flood ensures that the ack packet never returns so that the server runs out of room to process incoming connections.
有一种称为syn泛滥(SYN flood)的网络攻击,它使ack数据包无法返回,导致服务器用光内存空间,无法处理到来的连接。
The tcp_input () routine on the client side processes the SYN ACK packet, and calls tcp_output () to send an ACK packet back to the server.
客户端上的 tcp_input ()例程处理SYNACK包,并调用 tcp_output ()将 ACK 包发回到服务器。
In response, the scanned host returns a packet with the SYN and ack flags set if the port is open.
如果该端口是打开的,则被扫描主机返回设置了syn和ack标志的包进行响应。
In response, the scanned host returns a packet with the SYN and ack flags set if the port is open.
如果该端口是打开的,则被扫描主机返回设置了syn和ack标志的包进行响应。
应用推荐