Types of DDOS attack

Hy this is Aman, and I welcome you again to my new blog, I hope you will find this useful and support my blog by sharing and commenting on it.

We provide you best articles related to Gaming, Technology, and Advanced Tech ( Soon we will providing you stock market and crypto-related blog )

So let's get started

Check out the previous blog about Steganography tools and techniques for beginners





What is DOS & DDOS?


Dos-attack




DOS ⇒ Denial Of Service

a denial of service could be in the form of:


Hijacking web-servers - Overloading ports with requests rendering them unusable

Denying wireless authentication - Denying any sort of service that is provided on the internet

NOTE:  Attacks of such intent can be performed from a single machine


 While single machine attacks are much easier to execute and monitor, they are also easy to detect and mitigate too.


 To solve this issue, the attack could be executed from multiple devices spread across a wide area. ⇒ Such attacks are called Distributed Denial of Service or DDOS attacks.


How Does it Work?


DDOS-attack


The goal of DOS Attack ⇒ making a certain service unavailable.


 Since everything that is attacked is, in reality, running on a machine, the service can be made unavailable if the performance on the machine can be brought down.

This is the fundamental behind DOS and DDOS.


 Some DOS attacks are executed by flooding servers with connection requests until the server is overloaded and is deemed useless.

Others are executed by sending unfragmented packets to a server which they are unable to handle

These methods when executed by a botnet, exponentially increase the amount of damage that they are doing, and their difficulty to mitigate increases in leaps and bounds.

 


Types of DDOS Attacks


 


  • Ping of Death ⇒

In this, the attacker sends packets that are more than the max packet size when the packet fragments are added up.

max packet size is ⇒ 65,535 bytes

But in this attack, the attacker sends more than 65,535 bytes

Computers generally do not know what to do with such packets and end up freezing or sometimes completely crashing.



  • Reflected Attacks ⇒

This type of attack is performed with the help of a botnet also called reflectors in this case

The attacker sends a host of innocent computers a connection request using a botnet, that looks like it came from the victim machine (this is done by spoofing the source in the packet header).

This makes the host of the computer send an acknowledgment to the victim's computer.

Since there are multiple such requests from different computers to the same machine, this overloads the computer and crashes it.

This type is also called a smurf attack.



  • Mailbomb ⇒

Mailbomb attacks generally attack email servers.

In this type of attack instead of packets, oversized emails filled with random garbage values are sent to a targeted email server

This generally crashes the email server due to a sudden spike in load and renders them useless until fixed.



  • Teardrop ⇒

In this type of attack, the fragmentation offset field of a packet is abused.

One of the fields in an IP header is the “fragment offset” field, indicating the starting position, or offset, of the data contained in a fragmented packet relative to the data in the original packet.

If the sum of the offset and size of one fragmented packet differs from that of the next fragmented packet, the packets overlap

When this happens, a server vulnerable to teardrop attacks is unable to reassemble the packets — resulting in a denial-of-service condition.



  • Smurf ⇒

This type of attack uses large amounts of Internet Control Message Protocol (ICMP) ping traffic target at an Internet Broadcast Address.

The reply IP address is spoofed to that of the intended victim.

All the replies are sent to the victim instead of the IP used for the pings.

Since a single Internet Broadcast Address can support a maximum of 255 hosts, a smurf attack amplifies a single ping 255 times.

The effect of this is slowing down the network to a point where it is impossible to use it.

 


  • SYN attack ⇒

SYN is a short form for Synchronize

This type of attack takes advantage of the three-way handshake to establish communication using TCP.

SYN attack works by flooding the victim with incomplete SYN messages.

This causes the victim machine to allocate memory resources that are never used and deny access to legitimate users.



  • Buffer overflow ⇒

A buffer is a temporal storage location in RAM that is used to hold data so that the CPU can manipulate it before writing it back to the disc

Buffers have a size limit.

This type of attack loads the buffer with more data than it can hold.

This causes the buffer to overflow and corrupt the data it holds.

An example of a buffer overflow is sending emails with file names that have 256 characters.



So this is enough for today guys, hope you like it

Check out our more posts -

Steganography tools and techniques

Digital Forensics in cyber security

Social engineering attack

Cryptography in cyber security


Thanks for reading,

To your success,

Aman Yadav




You can also connect with us on our social profile mentioned below -


#ddos #botnet #ps  #ddosattack #botnets #bo #booter #vpn #botnetspots #botnetsetup #kalilinux #botnetforsale #qbot #botnetseller #xbox #gta #cybersecurity #ovh #anonymous #mirai #botnetspotsforsale #fortnite #online #linux #cyber  #bhfyp #love #amansays #itsamanyadav


Post a Comment

0 Comments