How does SYN use the TCP protocol to launch attacks?
SYN attack is a common method used by hackers and is one of the methods of DDoS. SYN attacks exploit TCP protocol flaws by sending a large number of semi-connection requests, consuming CPU and memory resources. In addition to affecting hosts, SYN attacks can also harm network systems such as routers and firewalls. In fact, SYN attacks do not matter what system the target is, as long as these systems open TCP services, they can be implemented.
To understand the basic principles of this attack, we still need to start with the process of establishing a TCP connection:
Everyone knows that TCP is based on connections, that is to say: in order to transmit TCP data between the server and the client, a virtual link, that is, a TCP connection, must be established first. The standard process of establishing a TCP connection is as follows :
In the first step, the requesting end (client) sends a TCP message containing the SYN flag. SYN means synchronization. The synchronization message will indicate the port used by the client and the initial sequence number of the TCP connection;
In the second step, after receiving the SYN message from the client, the server will return a SYN+ACK message, indicating that the client's request is accepted. At the same time, the TCP sequence number is increased by one, and ACK is confirmed.
In the third step, the client also returns a confirmation message ACK to the server. The TCP sequence number is also increased by one, and a TCP connection is completed.
The above connection process is called a three-way handshake in the TCP protocol.
The problem lies in the three-way handshake of the TCP connection. Suppose a user suddenly crashes or disconnects after sending a SYN message to the server. Then the server cannot receive the client's ACK message after sending a SYN+ACK response message. (The third handshake cannot be completed). In this case, the server will generally retry (send SYN+ACK to the client again) and wait for a period of time before discarding the unfinished connection. The length of this period is called SYN Timeout, generally speaking, this time is on the order of minutes (about 30 seconds-2 minutes).
It is not a big problem for a user to have an exception that causes a thread of the server to wait for 1 minute, but if a malicious attacker simulates this situation in large numbers, the server will consume a lot of money to maintain a very large semi-connection list. Many resources - tens of thousands of semi-connections. Even simple saving and traversing will consume a lot of CPU time and memory, not to mention the need to constantly retry SYN+ACK for the IPs in this list. .
In fact, if the server's TCP/IP stack is not powerful enough, the final result is often a stack overflow crash---even if the server-side system is powerful enough, the server-side will be busy processing the TCP connection requests forged by the attacker and will have no time to pay attention to the normal operations of the client. ask.
The above is the detailed content of How does SYN use the TCP protocol to launch attacks?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

VS Code system requirements: Operating system: Windows 10 and above, macOS 10.12 and above, Linux distribution processor: minimum 1.6 GHz, recommended 2.0 GHz and above memory: minimum 512 MB, recommended 4 GB and above storage space: minimum 250 MB, recommended 1 GB and above other requirements: stable network connection, Xorg/Wayland (Linux)

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

Although Notepad cannot run Java code directly, it can be achieved by using other tools: using the command line compiler (javac) to generate a bytecode file (filename.class). Use the Java interpreter (java) to interpret bytecode, execute the code, and output the result.

The reasons for the installation of VS Code extensions may be: network instability, insufficient permissions, system compatibility issues, VS Code version is too old, antivirus software or firewall interference. By checking network connections, permissions, log files, updating VS Code, disabling security software, and restarting VS Code or computers, you can gradually troubleshoot and resolve issues.

To view the Git repository address, perform the following steps: 1. Open the command line and navigate to the repository directory; 2. Run the "git remote -v" command; 3. View the repository name in the output and its corresponding address.

VS Code is available on Mac. It has powerful extensions, Git integration, terminal and debugger, and also offers a wealth of setup options. However, for particularly large projects or highly professional development, VS Code may have performance or functional limitations.

Visual Studio Code (VSCode) is a cross-platform, open source and free code editor developed by Microsoft. It is known for its lightweight, scalability and support for a wide range of programming languages. To install VSCode, please visit the official website to download and run the installer. When using VSCode, you can create new projects, edit code, debug code, navigate projects, expand VSCode, and manage settings. VSCode is available for Windows, macOS, and Linux, supports multiple programming languages and provides various extensions through Marketplace. Its advantages include lightweight, scalability, extensive language support, rich features and version

vscode built-in terminal is a development tool that allows running commands and scripts within the editor to simplify the development process. How to use vscode terminal: Open the terminal with the shortcut key (Ctrl/Cmd). Enter a command or run the script. Use hotkeys (such as Ctrl L to clear the terminal). Change the working directory (such as the cd command). Advanced features include debug mode, automatic code snippet completion, and interactive command history.
