وانت بتشرح الفديو ده جه في دماغي مثال حلو تخيلت إن فيه زبون بيتصل بمطعم ويطلب أوردرات كتير، ويقولهم: "ابعتوا الأكل على العنوان ده"، بس هو في الحقيقة بيديهم عنوان غلط. المطعم بيبدأ يحضر الأوردرات ويحجز موارد (زي الدليفري والتغليف)، بس لما الدليفري يوصل، يكتشف إن مفيش بيت في العنوان ده و محدش مستني الأوردر. إيه اللي حصل؟ المطعم (السيرفر) بيستهلك موارده على طلبات وهمية (SYN Requests)، وفي نفس الوقت مش قادر يخدم الزباين الحقيقيين لأن الموارد كلها محجوزة. بحب افكر في الحاجات دي بامثله من ارض الواقع بتكون لذيذه
@AyaRavelle17 күн бұрын
Nice one
@Bess_Gates23 күн бұрын
فديو جميل بشمهندس حسين شكرا D:
@oluwaseyiadeleye95586 ай бұрын
Nice! This really did justice to the SYN flood attack
@muhammadamir-fq5nl4 жыл бұрын
Woah! Great explanation. Thumbs up!!!!!
@coreymcmillan79904 ай бұрын
Really clear explanation! Thank you!
@mutedly Жыл бұрын
What an amazing explanation! Thank you so much 💙
@googtech3 жыл бұрын
Learned and Thanks for your tutorial.
@jupru220 Жыл бұрын
Thank you. That's a great explanation - I appreciate you sharing your knowledge!
@Christopher-uk5tw4 жыл бұрын
Good video having detail explanation. Thanks you so much !!
@hnasr4 жыл бұрын
Glad it helped!
@ShueperDan2 жыл бұрын
Such a great explanation, thank you.
@ayahjalal4703 жыл бұрын
that was a perfect explanation bro!! thankssss , btw are u saudi? because i have a saudi friend thats her family's name is nasser.
@abasov13963 жыл бұрын
Super explanation - Thanks!!!
@nathanc44078 ай бұрын
SYN Floods usually target bandwidth and not memory, right? SYN Spoofing will target the TCP table in memory
@aalsolaiman3 жыл бұрын
Great job, Keep it up
@SW-nx4jz3 жыл бұрын
Very helpful explanation! Thank you so much man
@hannibalimter46852 жыл бұрын
thank you habibi
@عدولةكن2 жыл бұрын
Thanks you, can l hehp you I want to use this protcol with Stepping stone algorithms
@93kazem4 жыл бұрын
How to mitigate this? Is there like a timeout that you can set that will close the half open connection?
@hnasr4 жыл бұрын
Firewalls mainly detect this and prevent it with deep packet analysis. They notice that hey, the server been sending SYN/ACKs but those clients are not replying so let us block this kind of traffic. Machine learning plays big rule here. I believe there is also a low level TCP timeout (SYN/ACK) timeout but the problem you don't want this to be set to very low otherwise normal connections will suffer.
@ravinaidu70623 жыл бұрын
@@hnasr thanks much
@NatureNomad17104 жыл бұрын
Please create a video on Cloudfare outage which occured on 18 july
@hnasr4 жыл бұрын
Nikhil Sharma I have my notes on this topic you read my mind 😊
@NatureNomad17104 жыл бұрын
@@hnasr thanks for the fan moment :)
@surfindrunk Жыл бұрын
Thank you!!!
@sugardoughnuts Жыл бұрын
ha-interesting. thank you!
@xyottax49253 жыл бұрын
Hi! Great video. But I would like to know this: If the c IP address (4:20) is an address of a real computer will the computer send an “ACK” back to the server or will it just ignore the “SYN ACK”? Thanks in advance! (PS:I’m really sorry for my English I’m not a native speaker)
@williamwolseley-charles20453 жыл бұрын
the "real" computer wouldn't send anything because maybe the port is closed or it isn't expecting a request to be sent to that port, therefore it will simply do nothing and ignore it.
@rfc-793-darpa8 ай бұрын
@@williamwolseley-charles2045 Just what I had thought, if you are lucky enough to get the IP right, you gotta a 1/65536 port chance, maybe more than one (port) eventually
@aviad_hayumi91664 жыл бұрын
Like your content , thank you :)
@arandomdude87012 жыл бұрын
Why does a syn flood need to be distributed? Cant it all come from a single device?
@yayacamara7176 Жыл бұрын
The single device can easily be detected and consequently ignored
@vxvbvcnvxcxnx33064 жыл бұрын
Great explanation. And you're humorous as fuck.
@jxw71964 жыл бұрын
Brill
@ca79864 жыл бұрын
❤️
@ZelenoJabko4 жыл бұрын
Needs 7 minutes to explain something that would need no more than 20 seconds.