Which specific attack floods a target with spoofed UDP packets directed at random ports with a large source IP range?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which specific attack floods a target with spoofed UDP packets directed at random ports with a large source IP range?

Explanation:
Flooding a target with UDP datagrams is a UDP flood attack. UDP is a connectionless protocol, so attackers can blast a high volume of packets toward the victim without performing any handshake. When these packets arrive, the target may have to process each one and, if the destination port is closed, send back an ICMP Port Unreachable message, wasting CPU and bandwidth and exhausting resources. Sending to random ports increases the chance that many services will be invoked or provoked to respond, amplifying the impact. Using a large range of spoofed source IPs helps hide the attacker and makes filtering harder, which is common in UDP flood campaigns. In contrast, ICMP flood relies on ICMP traffic, Ping of Death targets oversized packets, and Smurf uses spoofed ICMP echo requests to a broadcast address to amplify responses, so they do not match the described UDP-to-random-ports, spoofed-source pattern.

Flooding a target with UDP datagrams is a UDP flood attack. UDP is a connectionless protocol, so attackers can blast a high volume of packets toward the victim without performing any handshake. When these packets arrive, the target may have to process each one and, if the destination port is closed, send back an ICMP Port Unreachable message, wasting CPU and bandwidth and exhausting resources. Sending to random ports increases the chance that many services will be invoked or provoked to respond, amplifying the impact. Using a large range of spoofed source IPs helps hide the attacker and makes filtering harder, which is common in UDP flood campaigns. In contrast, ICMP flood relies on ICMP traffic, Ping of Death targets oversized packets, and Smurf uses spoofed ICMP echo requests to a broadcast address to amplify responses, so they do not match the described UDP-to-random-ports, spoofed-source pattern.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy