How is the Smurf denial-of-service attack mounted?
Answers
Answered by
2
Answer:
The Smurf denial-of-service attack is mounted by sending ICMP echo request to a broadcast address, and using the victim IP address as sender.
Explanation:
The Smurf malware generates a spoofed packet which has its source address as the real IP address. The packet is later sent to an IP address of the firewall. Each device will receive a request and resulting in denial of service.
Similar questions