Vip-----Munde
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Vip-----Munde

Jai Mata Di
 
HomeLatest imagesRegisterLog in
Welcome Dear Users Please Make Your First Post In Introdcution Section and Enjoy the forum
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» [Vn5socks.net] Auto update 24/7 - Good socks 8h00 PM
Different types of DoS & DDoS EmptySat Dec 01, 2018 7:57 pm by vn5socks.net

» [Shopsocks5.com] Service Socks5 Cheap - 19h40
Different types of DoS & DDoS EmptySat Dec 01, 2018 7:42 pm by shopsocks5.com

» [Vn5socks.net] Auto update 24/7 - Good socks 4h25 PM
Different types of DoS & DDoS EmptySat Dec 01, 2018 4:25 pm by vn5socks.net

» [Shopsocks5.com] Service Socks5 Cheap - 16h10
Different types of DoS & DDoS EmptySat Dec 01, 2018 4:10 pm by shopsocks5.com

» [Vn5socks.net] Auto update 24/7 - Good socks 8h40 AM
Different types of DoS & DDoS EmptySat Dec 01, 2018 8:45 am by vn5socks.net

» [Shopsocks5.com] Service Socks5 Cheap - 8h25
Different types of DoS & DDoS EmptySat Dec 01, 2018 8:25 am by shopsocks5.com

» [DICHVUSOCKS.US] 12h05 AM UPDATE 24/24- Good Socks
Different types of DoS & DDoS EmptySat Dec 01, 2018 12:01 am by dichvusocks

» [DICHVUSOCKS.US] 23h15 PM UPDATE 24/24- Good Socks
Different types of DoS & DDoS EmptyFri Nov 30, 2018 11:35 pm by dichvusocks

» [Vn5socks.net] Auto update 24/7 - Good socks 11h35 PM
Different types of DoS & DDoS EmptyFri Nov 30, 2018 11:34 pm by vn5socks.net

Top posters
vn5socks.net
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
dichvusocks
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
shopsocks5.com
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
tisocks
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
____H-E-A-R-T____
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
___devils____
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
***__яiCh_M@N ™__***
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
™12.-.@.-.j.-.@™
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
__Tigeя™__
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
a-x-n
Different types of DoS & DDoS I_vote_lcapDifferent types of DoS & DDoS I_voting_barDifferent types of DoS & DDoS I_vote_rcap 
Most active topics
Jokes In Hindi Funny
[Vn5socks.net] Service Seller Socks Good
Scanned Idz for Cracking
28 August 2011
Hotfile Premium Accounts
26 August 2011
30 August 2011
28 August 2011
29 August 2011
Show Your Cracking Hits
Most Viewed Topics
26 april 2012
23 Aug VIP Http
[Shopsocks5.com] Service Socks5 Cheap - 19h50
PROXIES SOCKS PROXY LIST 20h31 PM BY TISOCKS.NET
PROXIES SOCKS PROXY LIST 20h31 PM BY TISOCKS.NET
14 april 2012
28 april 2012
PROXIES SOCKS PROXY LIST 20h25 PM BY TISOCKS.NET
07 nov.2011
28 August 2011
Top posting users this month
No user

 

 Different types of DoS & DDoS

Go down 
AuthorMessage
__Dj_-k1ll3r__
Super Moderator
Super Moderator
__Dj_-k1ll3r__


Posts : 63
Points : 187
Reputation : 0
Join date : 2011-07-18

Different types of DoS & DDoS Empty
PostSubject: Different types of DoS & DDoS   Different types of DoS & DDoS EmptyThu Jul 21, 2011 8:06 pm

Different types of DoS & DDoS

A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it's users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:-

1) Ping Of Death :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it's commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote system to hang, reboot or crash. To do so the attacker uses, the ping command in conjuction with -l argument (used to specify the size of the packet sent) to ping the target system that exceeds the maximum bytes allowed by TCP/IP (65,536).
example:- c:/>ping -l 65540 hostname
Fortunately, nearly all operating systems these days are not vulnerable to the ping of death attack.

2) Teardrop Attack :- Whenever data is sent over the internet, it is broken into fragments at the source system and reassembled at the destination system. For example you need to send 3,000 bytes of data from one system to another. Rather than sending the entire chunk in a single packet, the data is broken down into smaller packets as given below:
* packet 1 will carry bytes 1-1000.
* packet 2 will carry bytes 1001-2000.
* packet 3 will carry bytes 2001-3000.
In teardrop attack, however, the data packets sent to the target computer contains bytes that overlaps with each other.
(bytes 1-1500) (bytes 1001-2000) (bytes 1500-2500)
When the target system receives such a series of packets, it can not reassemble the data and therefore will crash, hang, or reboot.
Old Linux systems, Windows NT/95 are vulnerable.

3) SYN - Flood Attack :- In SYN flooding attack, several SYN packets are sent to the target host, all with an invalid source IP address. When the target system receives these SYN packets, it tries to respond to each one with a SYN/ACK packet but as all the source IP addresses are invalid the target system goes into wait state for ACK message to receive from source. Eventually, due to large number of connection requests, the target systems' memory is consumed. In order to actually affect the target system, a large number of SYN packets with invalid IP addresses must be sent.

4) Land Attack :- A land attack is similar to SYN attack, the only difference being that instead of including an invalid IP address, the SYN packet include the IP address of the target system itself. As a result an infinite loop is created within the target system, which ultimately hangs and crashes.Windows NT before Service Pack 4 are vulnerable to this attack.

5) Smurf Attack :- There are 3 players in the smurf attack–the attacker,the intermediary (which can also be a victim) and the victim. In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic.
Smurf Attack Result:- Performance may be degraded such that the victim, the victim and intermediary networks become congested and unusable, i.e. clogging the network and preventing legitimate users from obtaining network services.

6) UDP - Flood Attack :- Two UDP services: echo (which echos back any character received) and chargen (which generates character) were used in the past for network testing and are enabled by default on most systems. These services can be used to launch a DOS by connecting the chargen to echo ports on the same or another machine and generating large amounts of network traffic.

7) Distributed Denial Of Service (DDoS) :- In Distributed DoS attack, there are 100 or more different attackers (systems) attacking the single system. Due to higher number of attackers DDoS attack is more effective and dangerous than regular DoS attack. The attackers have control over master zombies, which, in turn, have control over slave zombies.

No system connected to the internet is safe from DDoS attacks. All platforms, including Unix and Windows NT, are vulnerable to such attacks. Even Mac OS machines have been used to conduct DDoS attacks.

The most popular DDoS tools are:-

a) Trin00 (WinTrinoo)
b) Tribe Flood Network (TFN) (TFN2k)
c) Shaft
d) Stacheldraht
e) MStream
Cool Distributed Denial Of Service with Reflectors (DRDoS) :-
In DRDoS attacks the army of the attacker consists of master zombies, slave zombies, and reflectors. The difference in this type of attack is that slave zombies are led by master zombies to send a stream of packets with the victim's IP address as the source IP address to other uninfected machines (known as reflectors), exhorting these machines to connect with the victim. Then the reflectors send the victim a greater volume of traffic, as a reply to its exhortation for the opening of a new connection, because they believe that the victim was the host that asked for it. Therefore, in DRDoS attacks, the attack is mounted by non-compromised machines, which mount the attack without being aware of the action.
Back to top Go down
 
Different types of DoS & DDoS
Back to top 
Page 1 of 1
 Similar topics
-
» Cr. Bot Web(ddos) [VIP]

Permissions in this forum:You cannot reply to topics in this forum
Vip-----Munde :: PC Related :: Hackers' Lounge-
Jump to: