DDOS ATTACKS
TOO MANY TASKS TO FINISH TODAY? WE FEEL YOU
Distributed
Denial of Service or DDoS is one of the most common hacking techniques used by
hackers.
The logic
behind it is extremely simple. Similar to how a computer lags when we open too
many tabs on chrome, a DDoS attack will send millions of requests into a server
that will cause the server to overload and shutdown.
As simple
as it may seem, a DDoS attack can cause a lot of damage to the target system. Let’s
learn more on how to carry out one URL.
DDOS ATTACKS
At the
beginning of every semester, you make a resolution to complete one chapter every
day. However, you get lazy and the work piles up every day. Finally on the
D-day of exams there are just too many chapters to complete, mounting on each
other and your brain goes into a shut-down.
If you have
ever been in this situation, understanding a DDoS attack will be a breeze for
you. DDoS or Denial-of-service attack is basically flooding the system with
infinitely more service requests than it can handle simultaneously.
Watch the above video to know all about:
·
DDoS
·
Theory
behind DDoS
·
Reasons
behind an attack
·
How
to perform a DDoS attack using Kali LINUX
DDOS ATTACK TECHNIQUES
Let’s look
at a few types of DDoS attacks.
1. Ping of Death: The ping command is
usually used to test the availability of a network resource. It works by
sending small data packets to the network resource. The ping of death takes
advantage of this and sends data packets above the maximum limit (65,536 bytes)
that TCP/IP allows. Since it is larger than what the server can handle, the
server can freeze, reboot, or crash.
2. Smurf: This type of attack uses
large amounts of Internet Control Message Protocol (ICMP) ping traffic target
at an Internet Broadcast Address. The reply IP address is spoofed to that of
the intended victim. All the replies are sent to the victim instead of the IP
used for the pings. The effect of the this is slowing down the network to a
point where it is impossible to use it.
3. Buffer overflow: Buffers have a size
limit. This type of attack loads the buffer with more data that it can hold.
This causes the buffer to overflow and corrupt the data it holds.
4. Teardrop: This type of attack uses
larger data packets. The attacker manipulates the packets as they are sent so
that they overlap each other. This can cause the intended victim to crash as it
tries to re-assemble the packets.
DDOS ATTACK TOOLS
The
following are some of the tools that can be used to perform Dos attacks.
·
Low
Orbit Ion Cannon (LOIC): The LOIC is an open-source stress testing application.
It allows for both TCP and UDP protocol layer attacks. Derivatives have been
created that allow attacks to be launched using a web browser.
·
High
Orbit Ion Cannon (HOIC): By utilizing the HTTP protocol, the HOIC is able to
launch targeted attacks that are different to mitigate. The software is
designed to have a minimum of 50 people working together in a coordinated
attack effort.
·
Slowloris:
Slowloris is an application designed to instigate a low and slow attack on a targeted
server.
·
R.U.D.Y
(R-U-Dead-Yet): By opening multiple HTTP POST requests and then keeping those
connections open as long as possible, the attack aims to slowly overwhelm the
targeted server.
1. Which one of the following tools
opens multiple HTTP POST requests and keeps them open for as long as possible?
a. R.U.D.Y
b. H.O.I.C
c. L.O.I.C
d. Slowloris
Ans.a. R.U.D.Y
2. Which command is used to test the
availability of a network resources?
a. Ping
b. TearDrop
c. Smurf
d. Buffer
Ans-a. Ping
KEY TAKEAWAY!
A DDoS
attack aims to disrupt the normal flow of requests in the system by flooding
the system with millions of false requests and overwhelming the network traffic
so that the program cannot function properly.
·
A
DDoS attack requires an attacker to gain control of a network of online
machines in order to carry out an attack.
·
A
DDoS attack can attack against any of the & layers of the system and cause
plenty of damage it not controlled.
·
One
of the main techniques used to run a DDoS attack is the usage of botnets. A
botnet is a number of Internet-connected devices, each of which is running one
or more bots.
*FOR GOING TO NEXT OR SELECTING ANY TOPIC CLICK ANY OF THE BELOW LINKS:-
18. CAREERS IN ETHICAL HACKING 👈👈👈 CLICK HERE TO GO TO THE TOPIC
19. SOME PROJECTS ON ETHICAL HACKING 👈👈👈 CLICK HERE TO GO TO THE TOPIC
0 Comments