... denial-of-service,information leakage, file creation, reading, modification and removal, misinfor-mation, special file/database access, and elevation of privileges. Let’s startwith denial-of-service.Denial-of-ServiceWhat ... privileges. Let’s startwith denial-of-service.Denial-of-ServiceWhat is a denial-of-service (DoS) attack? A DoS attack takes place when avail-ability to a resource is intentionally blocked or ... dlen);memset(buf+4*ih->ihl+sizeof(*th)+dlen, 0, 4);ih->check=ip_sum(buf, (4*ih->ihl + sizeof(*th)+ dlen + 1) & ~1);memcpy(buf, ih, 4*ih->ihl);sin.sin_family=AF_INET;sin.sin_port=th->dest;sin.sin_addr.s_addr=ih->daddr;if(sendto(ssock,...