16 Questions 11 Answers 0 Followers
Questions related from Nikhil Tripathi
In past, I have worked on HTTP based Low-rate and Slow-rate HTTP DoS attacks. In continuation to that, I want to know about few other similar DoS attacks on layer-7.
07 July 2016 7,218 4 View
I need few reputed journals having very less review processing time in field of Networks & security.
01 January 2016 324 1 View
I am searching for such network attacks which are quite new and current research is going on to propose mitigation techniques for that attack.
11 November 2015 7,053 16 View
I wanted to know if an attacker can do manual associations of random MAC addresses with the access point. Can it be done in case of WPA2 encrypted networks too, i mean the complete four way...
04 April 2015 7,302 3 View
Please provide me some links or documents for the same.
04 April 2015 6,308 0 View
I want to know, on an average, how many wireless clients can be associated to a wireless access point at a time?
04 April 2015 9,061 8 View
According to cisco enterprise mobility, the clients are associated to Access Points using MAC address. So, can an attacker send various DHCPDISCOVER messages using spoofed random source MAC...
03 March 2015 544 7 View
I wanted to know when DHCP Server frees an offered (but not allotted) IP address and return it back to the address pool. Is there a time limit? This happens when server doesn't receive the...
03 March 2015 3,429 3 View
According to cisco enterprise mobility, it is stated that "Even if port security is not an option to stop MAC flooding in wireless networks, the MAC flooding attack is unsuccessful when launched...
03 March 2015 2,906 7 View
I have time period values on the X-axis and the probability of an event occurring at a particular time on the Y-axis.
01 January 2015 5,934 4 View
While capturing DHCPDISCOVER messages, I found out that some of them are sending these using an IP address. The snapshot for the same is attached:
01 January 2015 5,740 8 View
Suppose our TCP SYN packet goes directly to the attacker. Can he generate fake response (TCP SYN-ACK) packet and send it back to us?
01 January 2015 8,622 2 View
Regarding the updated information about the topic
05 May 2014 2,605 0 View
While poisoning an ARP cache, it is the legitimate user whose reply is received first rather than the attacker's fake reply when a corresponding request is sent. Maybe because the attacker is...
02 February 2014 7,414 15 View
I was scanning my network IPs. I found out that two different IP addresses were bound to the same MAC address. When I sent the ICMP echo requests to them, both of them responds back with echo reply.
01 January 2014 2,658 11 View
I want to check whether we can launch ARP poisoning attack in a subnet without really sitting in that subnet. Can we do it from a subnet which is connected to that subnet using a router?
12 December 2013 7,364 4 View