Students analyze the SYN-SYN/ACK-ACK handshake process that establishes reliable connections. They then explore how this mechanism can be exploited in SYN Flood attacks to create Denial of Service (DoS) conditions.

Similar Lessons