»
Linux
»
Examen sur Linux
»
Examen 202 : Networking Administration
»
Section 3
»
Question 16/20
16.Some network attacks use IP packets with the SYN, ACK, PSH, URG, FIN and RST options set. (This is sometimes called a “Chernobyl1 packet” or “xmas tree packet”, and crashes some operating systems.) To log all such packets received, you would use:
iptables –1 INPUT –s 0.0.0.0/0 –d 192.168.0.44/33 --protocol tcp --xmas-pkt –j LOG
iptables –1 INPUT –s 0.0.0.0/0 –d 192.168.0.44/32 --protocol tcp --cher-pkt –j LOG
iptables –1 INPUT –s 0.0.0.0/0 –d 192.168.0.44/32 --protocol tcp --cher-pkt –log
iptables –1 INPUT –s 0.0.0.0/0 –d 192.168.0.44/32 --protocol tcp --tcp-flags SYN, ACK, HSK, PSH, URG, FIN –log
iptables –1 INPUT –s 0.0.0.0/0 –d 192.168.0.44/32 --protocol tcp --tcp-flags ALL, SYN, ACK, PSH, URG, RST, FIN, -j LOG
Explanation
« Question 15
Question 17 »