Vip-----Munde
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Vip-----Munde

Jai Mata Di
 
HomeLatest imagesRegisterLog in
Welcome Dear Users Please Make Your First Post In Introdcution Section and Enjoy the forum
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» [Vn5socks.net] Auto update 24/7 - Good socks 8h00 PM
_____+.D.+.O.+.S.+____Attack____ EmptySat Dec 01, 2018 7:57 pm by vn5socks.net

» [Shopsocks5.com] Service Socks5 Cheap - 19h40
_____+.D.+.O.+.S.+____Attack____ EmptySat Dec 01, 2018 7:42 pm by shopsocks5.com

» [Vn5socks.net] Auto update 24/7 - Good socks 4h25 PM
_____+.D.+.O.+.S.+____Attack____ EmptySat Dec 01, 2018 4:25 pm by vn5socks.net

» [Shopsocks5.com] Service Socks5 Cheap - 16h10
_____+.D.+.O.+.S.+____Attack____ EmptySat Dec 01, 2018 4:10 pm by shopsocks5.com

» [Vn5socks.net] Auto update 24/7 - Good socks 8h40 AM
_____+.D.+.O.+.S.+____Attack____ EmptySat Dec 01, 2018 8:45 am by vn5socks.net

» [Shopsocks5.com] Service Socks5 Cheap - 8h25
_____+.D.+.O.+.S.+____Attack____ EmptySat Dec 01, 2018 8:25 am by shopsocks5.com

» [DICHVUSOCKS.US] 12h05 AM UPDATE 24/24- Good Socks
_____+.D.+.O.+.S.+____Attack____ EmptySat Dec 01, 2018 12:01 am by dichvusocks

» [DICHVUSOCKS.US] 23h15 PM UPDATE 24/24- Good Socks
_____+.D.+.O.+.S.+____Attack____ EmptyFri Nov 30, 2018 11:35 pm by dichvusocks

» [Vn5socks.net] Auto update 24/7 - Good socks 11h35 PM
_____+.D.+.O.+.S.+____Attack____ EmptyFri Nov 30, 2018 11:34 pm by vn5socks.net

Top posters
vn5socks.net
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
dichvusocks
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
shopsocks5.com
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
tisocks
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
____H-E-A-R-T____
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
___devils____
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
***__яiCh_M@N ™__***
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
™12.-.@.-.j.-.@™
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
__Tigeя™__
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
a-x-n
_____+.D.+.O.+.S.+____Attack____ I_vote_lcap_____+.D.+.O.+.S.+____Attack____ I_voting_bar_____+.D.+.O.+.S.+____Attack____ I_vote_rcap 
Most active topics
Jokes In Hindi Funny
[Vn5socks.net] Service Seller Socks Good
Scanned Idz for Cracking
28 August 2011
Hotfile Premium Accounts
26 August 2011
30 August 2011
28 August 2011
29 August 2011
Show Your Cracking Hits
Most Viewed Topics
26 april 2012
23 Aug VIP Http
28 april 2012
[Shopsocks5.com] Service Socks5 Cheap - 19h50
14 april 2012
PROXIES SOCKS PROXY LIST 20h31 PM BY TISOCKS.NET
PROXIES SOCKS PROXY LIST 20h31 PM BY TISOCKS.NET
PROXIES SOCKS PROXY LIST 20h25 PM BY TISOCKS.NET
07 nov.2011
28 August 2011
Top posting users this month
No user

 

 _____+.D.+.O.+.S.+____Attack____

Go down 
AuthorMessage
™12.-.@.-.j.-.@™
Admin
Admin
™12.-.@.-.j.-.@™


Posts : 261
Points : 773
Reputation : 0
Join date : 2011-07-18
Age : 35
Location : jaipur

_____+.D.+.O.+.S.+____Attack____ Empty
PostSubject: _____+.D.+.O.+.S.+____Attack____   _____+.D.+.O.+.S.+____Attack____ EmptyMon Oct 10, 2011 9:13 pm

Lets get started Denial of Service or (DoS) attacks have matured from mere annoyances to
severe high-profile attacks to e-commerce sites. When performing DoS attacks there are alot of
approached techniques, including the famous but old "Ping of Death" which will be covered in
this tutorial. DoS has been raging on since the 90's, getting more advanced and more serious.
This tutorial is going to explain the jist of it to you.

We will start at the beginning and I will start by saying that if you plan to bring down a
site with DoS its probably going to take more than 1 computer. The rage which has hit with DoS
is DDoS (distributed denial of service) which is a DoS attack, but not done by one user, done
by many users or a bot armie. A famous DDoS attack is the one done to GNR.com the attack
completely took up all the sites bandwith within seconds. There site was recorded to have been
attack by 456 Windows users.Now that you understand the god like power of this raging and more
feared attack. Lets move on to the different types of DoS attacks.


---Fragmentation overlap

By forcing the OS to deal with overlapping TCP/IP packet fragments, this attack caused many
OSs to suffer crashes and resource starvation. Exploit code was realeased with names such as
bong,boink, and teardrop.

---Oversized Packets

This is called the "Ping of Death" (ping -1 65510 192.168.2.3) an a Windows system (where
192.168.2.3 is the IP adress of the intended victim). What is happening is the attacker is
pinging every port on the victims computer causing it to echo back 65510 requests. Another
example is a jolt attack a simple C program for OSs whose ping commands wont generate
oversized packets. The main goals of the "Ping of Death" is to generate a packet size that
exceeds 65,535 bytes. Which can abrubtly cause the victim computer to crash. This technique
is old!

---Nukers

Yet another old form of attack this is related to a Windows vunlnerablity of some years ago
that sent out-of-band(OOB) packets. To the consenting computer causing it to crash.

---SYN floods

A newer technique of DoS is SYN floods, basically this is done through a 3 step process
better known as the three way handshake. When a TCP connection is initiated this occurs.
Under some normal circumstances, a SYN packet is sent from a specific port on system 1 to
a specific port on system 2 that is in the LISTEN state. Then the potential connection on
system 2 is in a SYN_RECV state. At this stage system 2 will attempt to send back a SYN/ACK
packet to system 1.If all works out, system 1 will send back an ACK packet, and the connection
will move to an ESTABLISHED state. Now thats what happens most of the time, but a SYN flood is
different it creates a half open connection. Most systems can sustain hundreds of connections
on a specific port, but it will only take a few half open connections to exhaust all the
resources on the computer.

---Smurf Attacks

The smurf attack was one of the first to demonstrate the use of unwitting DoS amplifiers on
the Internet. A smurf takes advantage of directed broadcasts and requires a minimum of three
actors: the attacker, the amplifying network, and the victim. What happens is the attacker
sends out spoofed ICMP ECHO packets to the broadcast address of the amplifying network. The
source address of packets is forged to make it appear as if the victim system has initiated
the request. Then all hell breaks loose!!! Because the ECHO packet was sent to the broadcast
address, all systems on the amplifying network will respond to the victim. Now take a thought
if the attacker sends just a single ICMP packet to an amplifying network which contains 500
systems that will respond to a broadcast ping, the attacker has now succeeded in multiplying
the DoS attack by a magnitude of 500!

---Fraggle Attack

A fraggle attack is the same as a smurf attack, but it uses UDP ports instead.

---DDoS Attack

This is a much harder to block kind of attack, it has been used against big sites such as
E-Trade, Ebay, and countless others. The problem with these attacks there very hard to trace.
Most traces can link back to @Home users! The new DDoS attacks are termed Zombies or Bots.
These bots rely heavily on remote automation techniques borrowed from Internet Relay Chat
(IRC) scripts of the same name. A group of zombies under the control of a single person is
called a zombie network or a bot army. The master of these armys or networks can do full
fledged DDoS attacks or SYN floods. The basic estimate size of zombie networks are from a few
systems to 150,000 systems. Even a few hundred machines could prove very dangerous.
Back to top Go down
https://tiger-attack.forumotion.com/
 
_____+.D.+.O.+.S.+____Attack____
Back to top 
Page 1 of 1
 Similar topics
-
» How To Send DoS Attack With CMD simple way
» Hello 2 all members of Tiger-Attack
» Silver Romm Attack -NMR-
» Hidden Camera : Octopus Attack
» Missing Files Setup Tiger-Attack

Permissions in this forum:You cannot reply to topics in this forum
Vip-----Munde :: PC Related :: Hackers' Lounge-
Jump to: