0% found this document useful (0 votes)
115 views5 pages

DDOS Attack Report

Faiz Ahmed conducted a denial of service (DoS) attack against his university website using the Low Orbit Canon tool. The basic attack brought the website down within a minute, demonstrating weak security. Faiz then provides definitions and explanations of DoS and distributed DoS (DDoS) attacks, as well as examples of historically significant attacks. Protection methods are discussed such as preventing spoofing, limiting broadcasting, streamlining incident response, protecting endpoints, using firewalls, and network monitoring. The report was submitted to the Head of IT Department at Dawood University of Engineering & Technology.

Uploaded by

Faiz Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views5 pages

DDOS Attack Report

Faiz Ahmed conducted a denial of service (DoS) attack against his university website using the Low Orbit Canon tool. The basic attack brought the website down within a minute, demonstrating weak security. Faiz then provides definitions and explanations of DoS and distributed DoS (DDoS) attacks, as well as examples of historically significant attacks. Protection methods are discussed such as preventing spoofing, limiting broadcasting, streamlining incident response, protecting endpoints, using firewalls, and network monitoring. The report was submitted to the Head of IT Department at Dawood University of Engineering & Technology.

Uploaded by

Faiz Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Report On Denial of Service Hack Attack

Reported By: Faiz Ahmed


Roll No: 21/F-BSAI-30

Assalam o Alaikum I am Faiz Ahmed and this my report on a DoS hack


attack I did some time ago. So couple of days earlier I was just messing
around on web trying to do some hack attacks for fun then I got an idea in
my mind and I thought of attacking my university website with denial of
service attack to check whether it is secured from it or not. So I open the
famous DoS attack tool named Low Orbit Canon (LOC) this tool was so
famous back in 2011 and 2012 because it was used by a hacker group
named anonymous to brought down Sony PSN network. So I opened up
the tool and started the attack at first nothing happened but after one
minute or so the website got down completely. It was a very basic attack
and the website didn’t stood up against it not even for a minute. Now I am
going to suggest you somethings to upgrade the security of the website. So
first of all let me tell you what Denial of Service attack(DoS) and what is
Distributed Denial of Service attack(DDoS) and what is the difference
between these two.

What is a denial-of-service attack?


A denial-of-service (DoS) attack is a type of cyber-attack in which a malicious actor
aims to render a computer or other device unavailable to its intended users by
interrupting the device's normal functioning. DoS attacks typically function by
overwhelming or flooding a targeted machine with requests until normal traffic is unable
to be processed, resulting in denial-of-service to addition users. A DoS attack is
characterized by using a single computer to launch the attack.

A distributed denial-of-service (DDoS) attack is a type of DoS attack that comes from
many distributed sources, such as a botnet DDoS attack.
How does a DoS attack work?
The primary focus of a DoS attack is to oversaturate the capacity of a targeted machine,
resulting in denial of service to additional requests. The multiple attack vectors of DoS
attacks can be grouped by their similarities.

DoS attacks typically fall in 2 categories:

Buffer overflow attacks


An attack type in which a memory buffer overflow can cause a machine to consume all
available hard disk space, memory, or CPU time. This form of exploit often results in
sluggish behavior, system crashes, or other deleterious server behaviors, resulting in
denial of service.

Flood attacks

By saturating a targeted server with an overwhelming amount of packets, a malicious

actor is able to oversaturate server capacity, resulting in denial-of-service. In order for


most DoS flood attacks to be successful, the malicious actor must have more available
bandwidth than the target.

What are some historically significant DoS attacks?


Historically, DoS attacks typically exploited security vulnerabilities present in network,
software and hardware design. These attacks have become less prevalent as DDoS
attacks have a greater disruptive capability and are relatively easy to create given the
available tools. In reality, most DoS attacks can also be turned into DDoS attacks.
A few common historic DoS attacks include:

1) Smurf attack - a previously exploited DoS attack in which a malicious actor utilizes
the broadcast address of vulnerable network by sending spoofed packets, resulting in
the flooding of a targeted IP address.

2) Ping flood - this simple denial-of-service attack is based on overwhelming a target


with ICMP (ping) packets. By inundating a target with more pings than it is able to
respond to efficiently, denial-of-service can occur. This attack can also be used as a
DDoS attack.

3) Ping of Death - often conflated with a ping flood attack, a ping of death attack
involves sending a malformed packet to a targeted machine, resulting in deleterious
behavior such as system crashes.

What is the difference between a DDoS attack and a


DOS attack?

The distinguishing difference between DDoS and DoS is the number of connections
utilized in the attack. Some DoS attacks, such as “low and slow” attacks like Slowloris,
derive their power in the simplicity and minimal requirements needed to them b
effective.
DoS utilizes a single connection, while a DDoS attack utilizes many sources of attack
traffic, often in the form of a botnet. Generally speaking, many of the attacks are
fundamentally similar and can be attempted using one more many sources of malicious
traffic.

How can you tell if a computer is experiencing a DoS


attack?

While it can be difficult to separate an attack from other network connectivity errors or
heavy bandwidth consumption, some characteristics may indicate an attack is
underway. Indicators of a DoS attack include:

1) A typically slow network performance such as long load times for files or websites

2) The inability to load a particular website such as your web property

3) A sudden loss of connectivity across devices on the same network

Protection Against Denial of Service Attacks


While DoS attacks are less challenging to stop or prevent, DDoS attacks can still
present a serious threat.
Prevent spoofing: Check that traffic has a source address consistent with the set of
addresses for its stated site of origin and use filters to stop dial-up connections from
spoofing.
Limit broadcasting: Often attacks will send requests to every device on the network,
amplifying the attack. Limiting or turning off broadcast forwarding where possible can
disrupt attacks. Users can also disable echo and chargen services where possible.
Streamline incident response: Honing your incident response can help your security
team respond quickly when DoS attacks are detected.
Protect endpoints: Ensure that all endpoints are patched to eliminate known
vulnerabilities. Endpoints capable of running EDR agents should have them installed.
Dial in firewalls: Ensure your firewalls are limiting ingress and egress traffic across the
perimeter wherever possible.
Monitor the network: The more you know about what normal inbound traffic looks like,
the quicker you'll spot the start of a DDoS attack. Real-time visibility with network
detection and response (NDR) is an efficient and reliable way to maintain a profile of
what your network should look like (using machine learning) so you can detect
suspicious surges immediately.

Reported To: Head of IT Department


Place: Dawood University of Engineering & Technology

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy