Solved

stateful packet inspection -- relation to clients' computer security

Posted on 2009-07-02
2
267 Views
Last Modified: 2012-05-07
What does the "state" of a TCP/IP packet have to do with whether it is from a user-requested web site, or from a hacker trying to gain access to a client computer, with reagrd to the "stateful packet inspection" that presumably only hardware firewalls are capable of?
0
Comment
Question by:Casey Claassen
2 Comments
 
LVL 32

Accepted Solution

by:
rsivanandan earned 35 total points
ID: 24765085
To simply look at it,

If the packet coming from outside

1. Has SYN and ACK bit set then it means that the connection was indeed originated from the inside machine and that is why acknowledgment is coming.

2. After that every packet passed has sequence numbers which are math bound and has relation with the packet sent.

So keeping the state information helps find it.

Now if a hacker sends a reply packet with 'syn' and 'ack' bit set, the machine won't entertain it since it didn't originate that traffic at all.

Does that help?

Cheers,
Rajesh
0
 

Author Closing Comment

by:Casey Claassen
ID: 31599172
Yes, that does indeed help!
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Occasionally, we encounter connectivity issues that appear to be isolated to cable internet service.  The issues we typically encountered were reset errors within Internet Explorer when accessing web sites or continually dropped or failing VPN conne…
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question