Nice! This really did justice to the SYN flood attack
@muhammadamir-fq5nl4 жыл бұрын
Woah! Great explanation. Thumbs up!!!!!
@coreymcmillan799023 күн бұрын
Really clear explanation! Thank you!
@mutedly Жыл бұрын
What an amazing explanation! Thank you so much 💙
@Christopher-uk5tw4 жыл бұрын
Good video having detail explanation. Thanks you so much !!
@hnasr4 жыл бұрын
Glad it helped!
@jupru22010 ай бұрын
Thank you. That's a great explanation - I appreciate you sharing your knowledge!
@googtech3 жыл бұрын
Learned and Thanks for your tutorial.
@ShueperDan2 жыл бұрын
Such a great explanation, thank you.
@SW-nx4jz2 жыл бұрын
Very helpful explanation! Thank you so much man
@ayahjalal4702 жыл бұрын
that was a perfect explanation bro!! thankssss , btw are u saudi? because i have a saudi friend thats her family's name is nasser.
@abasov13962 жыл бұрын
Super explanation - Thanks!!!
@aalsolaiman3 жыл бұрын
Great job, Keep it up
@nathanc44074 ай бұрын
SYN Floods usually target bandwidth and not memory, right? SYN Spoofing will target the TCP table in memory
@عدولةكن2 жыл бұрын
Thanks you, can l hehp you I want to use this protcol with Stepping stone algorithms
@93kazem4 жыл бұрын
How to mitigate this? Is there like a timeout that you can set that will close the half open connection?
@hnasr4 жыл бұрын
Firewalls mainly detect this and prevent it with deep packet analysis. They notice that hey, the server been sending SYN/ACKs but those clients are not replying so let us block this kind of traffic. Machine learning plays big rule here. I believe there is also a low level TCP timeout (SYN/ACK) timeout but the problem you don't want this to be set to very low otherwise normal connections will suffer.
@ravinaidu70623 жыл бұрын
@@hnasr thanks much
@hannibalimter46852 жыл бұрын
thank you habibi
@NatureNomad17104 жыл бұрын
Please create a video on Cloudfare outage which occured on 18 july
@hnasr4 жыл бұрын
Nikhil Sharma I have my notes on this topic you read my mind 😊
@NatureNomad17104 жыл бұрын
@@hnasr thanks for the fan moment :)
@surfindrunk Жыл бұрын
Thank you!!!
@xyottax49253 жыл бұрын
Hi! Great video. But I would like to know this: If the c IP address (4:20) is an address of a real computer will the computer send an “ACK” back to the server or will it just ignore the “SYN ACK”? Thanks in advance! (PS:I’m really sorry for my English I’m not a native speaker)
@williamwolseley-charles20453 жыл бұрын
the "real" computer wouldn't send anything because maybe the port is closed or it isn't expecting a request to be sent to that port, therefore it will simply do nothing and ignore it.
@guilhermegavioli56474 ай бұрын
@@williamwolseley-charles2045 Just what I had thought, if you are lucky enough to get the IP right, you gotta a 1/65536 port chance, maybe more than one (port) eventually
@sugardoughnuts Жыл бұрын
ha-interesting. thank you!
@aviad_hayumi91664 жыл бұрын
Like your content , thank you :)
@vxvbvcnvxcxnx33063 жыл бұрын
Great explanation. And you're humorous as fuck.
@arandomdude87012 жыл бұрын
Why does a syn flood need to be distributed? Cant it all come from a single device?
@yayacamara717610 ай бұрын
The single device can easily be detected and consequently ignored
@ca79864 жыл бұрын
❤️
@jxw71963 жыл бұрын
Brill
@ZelenoJabko4 жыл бұрын
Needs 7 minutes to explain something that would need no more than 20 seconds.