SYN flooding still a threat to servers?

Posted by Rob on Stack Overflow See other posts from Stack Overflow or by Rob
Published on 2010-05-14T17:11:44Z Indexed on 2010/05/14 17:14 UTC
Read the original article Hit count: 324

Well recently I've been reading about different Denial of Service methods. One method that kind of stuck out was SYN flooding. I'm a member of some not-so-nice forums, and someone was selling a python script that would DoS a server using SYN packets with a spoofed IP address.

However, if you sent a SYN packet to a server, with a spoofed IP address, the target server would return the SYN/ACK packet to the host that was spoofed. In which case, wouldn't the spoofed host return an RST packet, thus negating the 75 second long-wait, and ultimately failing in its attempt to DoS the server?

© Stack Overflow or respective owner

Related posts about python

Related posts about tcp