Dos attacks-“Denial of Service” Attack. It’s the attack to deny the service to the legitmate user, so that he suffers (in any way). There are several reasons and ways to do that.
Email Bombs – it s the technique in which a person email A/c is flooded with emails. It’s the lamest form of DOS attack. All a person has to do is go on the net get an email bomber, put the victims address and there you go. His email address will be flooded with the unwanted emails. When the victims email A/c gets flooded, he has to delete the unwanted emails. You just mess victim's A/c. If the victim is the admin of the server and u flooded his email A/c, he looses his disk space (temporary).
Continous Login – Suppose a server is configured to allow specific number of logins attempts and u know a user's username, try to login with any password (wrong password) and his A/c will be locked (this is lame too).
Syn Flooding – This is an exploit in tcp/ip method of handshake. Syn packet is send to the host via spoofed ip address (dead or bad ip addresses). The host replies with syn/ack packet and waits fot the ack packet. But the ip doesnt exist, so the host is still waiting, puts the ip in queue and eats the system resources. That causes the server to crash or reboot.Land Attack – Similar to syn attack. The difference is on the ip address it uses. Instead of bad or dead ip, it uses the target system's ip. This creates an infinite loop, and the target system crashes. But however almost all systems are configured against to this type of attacks.
Smurf Attack – A sort of brute forces dos attack in which a huge number, normally the router, using the spoofed ip address from within the target network, gets the ping and echos back, causing network to flood. Thus jamming the traffic.
Udp Flooding – This kind of flooding is done against two target systems and can be used to stop the services offered by any of the two systems. Both of the target systems are connected to each other. One generating a series of characters for each packet received or in other words, requesting UDP character generating service, while the other system echoes all the charcters it receives. This creates an infinite non-stopping loop between the two systems, making them useless for any data exchange or service provision.
Ping Of Death – This doesnt work any more, since now all servers are patched against this attack. A target system is pinged with data packet exceed the normal size allowed by the tcp/ip. This will cause the system to reboot or to hangup.
Tear Drop – When the data is passed from one system into another, it is broken into smaller fragments and then in the receiving host they are again reassembled. These packets have an offset field in there TCP header part which specifies from which part to which part that data carries or the range of data that it is carrying. This along with the sequence numbers, this helps the receiving host to reassemble the data. In tear drop, the packets are sent with the overlapping offset field values, thus the receiving host is unable to reassemble them and crashes.

1 comment:
Yo im liking this post. Cheers for sharing. pimpyourapple.blogspot.com
Post a Comment