SYN Flood Attack Explained

  Рет қаралды 56,105

Hussein Nasser

Hussein Nasser

Күн бұрын

Пікірлер: 39
@Bess_Gates
@Bess_Gates 23 күн бұрын
وانت بتشرح الفديو ده جه في دماغي مثال حلو تخيلت إن فيه زبون بيتصل بمطعم ويطلب أوردرات كتير، ويقولهم: "ابعتوا الأكل على العنوان ده"، بس هو في الحقيقة بيديهم عنوان غلط. المطعم بيبدأ يحضر الأوردرات ويحجز موارد (زي الدليفري والتغليف)، بس لما الدليفري يوصل، يكتشف إن مفيش بيت في العنوان ده و محدش مستني الأوردر. إيه اللي حصل؟ المطعم (السيرفر) بيستهلك موارده على طلبات وهمية (SYN Requests)، وفي نفس الوقت مش قادر يخدم الزباين الحقيقيين لأن الموارد كلها محجوزة. بحب افكر في الحاجات دي بامثله من ارض الواقع بتكون لذيذه
@AyaRavelle
@AyaRavelle 17 күн бұрын
Nice one
@Bess_Gates
@Bess_Gates 23 күн бұрын
فديو جميل بشمهندس حسين شكرا D:
@oluwaseyiadeleye9558
@oluwaseyiadeleye9558 6 ай бұрын
Nice! This really did justice to the SYN flood attack
@muhammadamir-fq5nl
@muhammadamir-fq5nl 4 жыл бұрын
Woah! Great explanation. Thumbs up!!!!!
@coreymcmillan7990
@coreymcmillan7990 4 ай бұрын
Really clear explanation! Thank you!
@mutedly
@mutedly Жыл бұрын
What an amazing explanation! Thank you so much 💙
@googtech
@googtech 3 жыл бұрын
Learned and Thanks for your tutorial.
@jupru220
@jupru220 Жыл бұрын
Thank you. That's a great explanation - I appreciate you sharing your knowledge!
@Christopher-uk5tw
@Christopher-uk5tw 4 жыл бұрын
Good video having detail explanation. Thanks you so much !!
@hnasr
@hnasr 4 жыл бұрын
Glad it helped!
@ShueperDan
@ShueperDan 2 жыл бұрын
Such a great explanation, thank you.
@ayahjalal470
@ayahjalal470 3 жыл бұрын
that was a perfect explanation bro!! thankssss , btw are u saudi? because i have a saudi friend thats her family's name is nasser.
@abasov1396
@abasov1396 3 жыл бұрын
Super explanation - Thanks!!!
@nathanc4407
@nathanc4407 8 ай бұрын
SYN Floods usually target bandwidth and not memory, right? SYN Spoofing will target the TCP table in memory
@aalsolaiman
@aalsolaiman 3 жыл бұрын
Great job, Keep it up
@SW-nx4jz
@SW-nx4jz 3 жыл бұрын
Very helpful explanation! Thank you so much man
@hannibalimter4685
@hannibalimter4685 2 жыл бұрын
thank you habibi
@عدولةكن
@عدولةكن 2 жыл бұрын
Thanks you, can l hehp you I want to use this protcol with Stepping stone algorithms
@93kazem
@93kazem 4 жыл бұрын
How to mitigate this? Is there like a timeout that you can set that will close the half open connection?
@hnasr
@hnasr 4 жыл бұрын
Firewalls mainly detect this and prevent it with deep packet analysis. They notice that hey, the server been sending SYN/ACKs but those clients are not replying so let us block this kind of traffic. Machine learning plays big rule here. I believe there is also a low level TCP timeout (SYN/ACK) timeout but the problem you don't want this to be set to very low otherwise normal connections will suffer.
@ravinaidu7062
@ravinaidu7062 3 жыл бұрын
@@hnasr thanks much
@NatureNomad1710
@NatureNomad1710 4 жыл бұрын
Please create a video on Cloudfare outage which occured on 18 july
@hnasr
@hnasr 4 жыл бұрын
Nikhil Sharma I have my notes on this topic you read my mind 😊
@NatureNomad1710
@NatureNomad1710 4 жыл бұрын
@@hnasr thanks for the fan moment :)
@surfindrunk
@surfindrunk Жыл бұрын
Thank you!!!
@sugardoughnuts
@sugardoughnuts Жыл бұрын
ha-interesting. thank you!
@xyottax4925
@xyottax4925 3 жыл бұрын
Hi! Great video. But I would like to know this: If the c IP address (4:20) is an address of a real computer will the computer send an “ACK” back to the server or will it just ignore the “SYN ACK”? Thanks in advance! (PS:I’m really sorry for my English I’m not a native speaker)
@williamwolseley-charles2045
@williamwolseley-charles2045 3 жыл бұрын
the "real" computer wouldn't send anything because maybe the port is closed or it isn't expecting a request to be sent to that port, therefore it will simply do nothing and ignore it.
@rfc-793-darpa
@rfc-793-darpa 8 ай бұрын
@@williamwolseley-charles2045 Just what I had thought, if you are lucky enough to get the IP right, you gotta a 1/65536 port chance, maybe more than one (port) eventually
@aviad_hayumi9166
@aviad_hayumi9166 4 жыл бұрын
Like your content , thank you :)
@arandomdude8701
@arandomdude8701 2 жыл бұрын
Why does a syn flood need to be distributed? Cant it all come from a single device?
@yayacamara7176
@yayacamara7176 Жыл бұрын
The single device can easily be detected and consequently ignored
@vxvbvcnvxcxnx3306
@vxvbvcnvxcxnx3306 4 жыл бұрын
Great explanation. And you're humorous as fuck.
@jxw7196
@jxw7196 4 жыл бұрын
Brill
@ca7986
@ca7986 4 жыл бұрын
❤️
@ZelenoJabko
@ZelenoJabko 4 жыл бұрын
Needs 7 minutes to explain something that would need no more than 20 seconds.
@moayadyaghi
@moayadyaghi 3 жыл бұрын
Get well
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН
Арыстанның айқасы, Тәуіржанның шайқасы!
25:51
QosLike / ҚосЛайк / Косылайық
Рет қаралды 700 М.
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН
SYN Flood Attack Whiteboard Presentation
6:23
Prabh Nair
Рет қаралды 13 М.
UDP doesn't suck! It's the BEST L4 protocol for THESE types of applications...
11:52
Malware Development: Processes, Threads, and Handles
31:29
Denial of Service Attacks (Part 3): TCP SYN Flooding
8:51
Sourcefire
Рет қаралды 64 М.
Denial of Service Attacks Explained
9:52
IBM Technology
Рет қаралды 73 М.
TLS/SSL Certificate Pinning Explained
12:03
Hussein Nasser
Рет қаралды 59 М.
Is there a Limit to Number of Connections a Backend can handle?
18:43
Hussein Nasser
Рет қаралды 34 М.
before you code, learn how computers work
7:05
Low Level
Рет қаралды 633 М.
Cross Site Request Forgery vs Server Side Request Forgery Explained
12:23
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН