Ticker

"WEBSITE UNDER MAINTENANCE"

DDOS ATTACKS OR THE DISTRIBUTED DENIAL OF SERVICE ATTACK:-

 DDOS ATTACKS

TOO MANY TASKS TO FINISH TODAY? WE FEEL YOU

Distributed Denial of Service or DDoS is one of the most common hacking techniques used by hackers.

The logic behind it is extremely simple. Similar to how a computer lags when we open too many tabs on chrome, a DDoS attack will send millions of requests into a server that will cause the server to overload and shutdown.

As simple as it may seem, a DDoS attack can cause a lot of damage to the target system. Let’s learn more on how to carry out one URL.

DDOS ATTACKS



At the beginning of every semester, you make a resolution to complete one chapter every day. However, you get lazy and the work piles up every day. Finally on the D-day of exams there are just too many chapters to complete, mounting on each other and your brain goes into a shut-down.

If you have ever been in this situation, understanding a DDoS attack will be a breeze for you. DDoS or Denial-of-service attack is basically flooding the system with infinitely more service requests than it can handle simultaneously.

Watch the above video to know all about:

·        DDoS

·        Theory behind DDoS

·        Reasons behind an attack

·        How to perform a DDoS attack using Kali LINUX

DDOS ATTACK TECHNIQUES

Let’s look at a few types of DDoS attacks.

1.      Ping of Death: The ping command is usually used to test the availability of a network resource. It works by sending small data packets to the network resource. The ping of death takes advantage of this and sends data packets above the maximum limit (65,536 bytes) that TCP/IP allows. Since it is larger than what the server can handle, the server can freeze, reboot, or crash.

2.      Smurf: This type of attack uses large amounts of Internet Control Message Protocol (ICMP) ping traffic target at an Internet Broadcast Address. The reply IP address is spoofed to that of the intended victim. All the replies are sent to the victim instead of the IP used for the pings. The effect of the this is slowing down the network to a point where it is impossible to use it.

3.      Buffer overflow: Buffers have a size limit. This type of attack loads the buffer with more data that it can hold. This causes the buffer to overflow and corrupt the data it holds.

4.      Teardrop: This type of attack uses larger data packets. The attacker manipulates the packets as they are sent so that they overlap each other. This can cause the intended victim to crash as it tries to re-assemble the packets.

DDOS ATTACK TOOLS

The following are some of the tools that can be used to perform Dos attacks.

·        Low Orbit Ion Cannon (LOIC): The LOIC is an open-source stress testing application. It allows for both TCP and UDP protocol layer attacks. Derivatives have been created that allow attacks to be launched using a web browser.

·        High Orbit Ion Cannon (HOIC): By utilizing the HTTP protocol, the HOIC is able to launch targeted attacks that are different to mitigate. The software is designed to have a minimum of 50 people working together in a coordinated attack effort.

·        Slowloris: Slowloris is an application designed to instigate a low and slow attack on a targeted server.

·        R.U.D.Y (R-U-Dead-Yet): By opening multiple HTTP POST requests and then keeping those connections open as long as possible, the attack aims to slowly overwhelm the targeted server.

1.      Which one of the following tools opens multiple HTTP POST requests and keeps them open for as long as possible?

a.      R.U.D.Y

b.      H.O.I.C

c.      L.O.I.C

d.      Slowloris

Ans.a. R.U.D.Y

2.      Which command is used to test the availability of a network resources?

a.      Ping

b.      TearDrop

c.      Smurf

d.      Buffer

Ans-a. Ping

 

KEY TAKEAWAY!

A DDoS attack aims to disrupt the normal flow of requests in the system by flooding the system with millions of false requests and overwhelming the network traffic so that the program cannot function properly.

·        A DDoS attack requires an attacker to gain control of a network of online machines in order to carry out an attack.

·        A DDoS attack can attack against any of the & layers of the system and cause plenty of damage it not controlled.

·        One of the main techniques used to run a DDoS attack is the usage of botnets. A botnet is a number of Internet-connected devices, each of which is running one or more bots.

*FOR GOING TO NEXT OR SELECTING ANY TOPIC CLICK ANY OF THE BELOW LINKS:-

18. CAREERS IN ETHICAL HACKING        👈👈👈 CLICK HERE TO GO TO THE TOPIC

19. SOME PROJECTS ON ETHICAL HACKING        👈👈👈 CLICK HERE TO GO TO THE TOPIC

Post a Comment

0 Comments

Subscribe

We'll send you AWESOME content!