DoS and DDoS attacks – Basic notions + Tools for DDos and DoS attacks


SUBMITTED BY: mschosting

DATE: March 5, 2016, 8:02 p.m.

FORMAT: Text only

SIZE: 2.7 kB

HITS: 936

  1. DoS or (Denial of services) attacks are a way to exploit a user resources in a way the “services ” become unavaliable.
  2. While DDoS stands for (Distributed Denial of Service) attacks. Are the same as DoS except that they use hundreds, or even thousands of machines to flood the services and cause the malfunction.
  3. Usually this is performed by flooding the service with ICMP packets forcing a server to respond to the request by the attackers (this is achieved by the need to reply to the ICMP packet). Other attacks including sending malformed ICMP packets, flooding the site with resource requests, or SYN flood attacks.
  4. Despite the ICMP traffic uses the TCP protocol, this kind of attack will not work on a Tor network. There are hundreds of reasons for .onion websites and markets to become unavailable, but rest assure a ICMP attack is not one of them.
  5. But when this kind of attack is targeted at the Clearnet for example against www.facebook.com. Over and over again they keep being successful.
  6. Or another method of achieving the same result- Ping of death attack (catchy name right!)ping-of-death
  7. This attack is accomplished in two different ways, the first method is quite obvious, just send too many packages to flood the system. A system using Windows as the absolute packet size limit of 64K (65535 bytes).
  8. This means that if you are able to send packets larger then the 64k limit, it will either completely crash down the system, or it will enable the attacker to successfully perform a privilege escalation attack. Flooding the site with requests for resources (videos, pictures, login requests, etc.)
  9. To prevent this attacks you need to focus more on the hardware control then the implementations with the site itself. If you are hosting and managing both, the server and the website, you should try to enable ingress filtering over your network, to stop some of the attacks on the spot. If you use the backscatter traceback method you will be able to do just that.
  10. Also take care to block the ICMP packets looking for your external interface (the WAN). Take special attention to block all the “unallocated source address'”.
  11. Following these steps you will not stop a DDoS, but you certainly will weaken the effect.
  12. Tools for DDos and DoS attacks
  13. This is a section you are not going to find in many websites on the open web! But yes there are no Taboos on securityfreak everyone as the right to know this stuff.
  14. I do not encourage you or recommend that you use this tools, but if you do, you are on your own.
  15. Keep reading the article here: thanks http://www.securityfreak.info/security/dos-ddos-attacks-basics/

comments powered by Disqus