Dark Mode

Settings

Capec-482 Detail

TCP Flood

Standard Communications Software

Parents: 125

Threats: T61 T64 T74 T77 T107 T264 T265 T269 T282 T285 T289 T308 T309 T335 T374 T401 T404

Description

An adversary may execute a flooding attack using the TCP protocol with the intent to deny legitimate users access to a service. These attacks exploit the weakness within the TCP protocol where there is some state information for the connection the server needs to maintain. This often involves the use of TCP SYN messages.

Not present

External ID Source Link Description
CAPEC-482 capec https://capec.mitre.org/data/definitions/482.html
CWE-770 cwe http://cwe.mitre.org/data/definitions/770.html
T1498.001 ATTACK https://attack.mitre.org/wiki/Technique/T1498/001 Network Denial of Service: Direct Network Flood
T1499.001 ATTACK https://attack.mitre.org/wiki/Technique/T1499/001 Endpoint Denial of Service: OS Exhaustion Flood
T1499.002 ATTACK https://attack.mitre.org/wiki/Technique/T1499/002 Endpoint Denial of Service: Service Exhaustion Flood

Not present

  1. This type of an attack requires the ability to generate a large amount of TCP traffic to send to the target port of a functioning server.

Not present

Not present

Not present

Not present