How to View SYN-Flood attack using the Command Prompt ?
SYN Flood Attack :-
- An arriving SYN sends the “connection” into SYN-RCVD state
- It can stay in this state for quite a while, awaiting the acknowledgment of the SYN+ACK packet, and tying up memory
- For this reason, the number of connections for a given port in SYN-RCVD state is limited
- Further SYN packets for that port are dropped
- The trick is the address forgery — if the attacker impersonates a non-existent host, neither the SYN+ACK nor a RST will ever arrive
- The port is thus blocked
I am going to show you how you can easily detect the SYN-Flood attack on the server using command prompt. It,s very easy to find out. Just open the command prompt and type the following command
C:> netstat –n –p TCP
If you are seeing only SYN_RECV, means you are under SYN-Flood attack.
Hope you like my post How to View SYN-Flood attack using the Command Prompt, Please Share with others. For more tips visit my other website www.rumyhacktips.com