0% found this document useful (0 votes)
14 views2 pages

10 Denial of Services

Denial-of-Service (DoS) attacks aim to make a service unavailable by overwhelming it with traffic or requests, leading to symptoms like slow performance and loss of access. Distributed Denial of Service (DDoS) attacks involve multiple compromised systems targeting a single victim, utilizing various techniques such as bandwidth attacks and SYN flooding. Preventive measures include using load balancers, firewalls, and cloud services to mitigate the impact of such attacks.

Uploaded by

caden87599
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views2 pages

10 Denial of Services

Denial-of-Service (DoS) attacks aim to make a service unavailable by overwhelming it with traffic or requests, leading to symptoms like slow performance and loss of access. Distributed Denial of Service (DDoS) attacks involve multiple compromised systems targeting a single victim, utilizing various techniques such as bandwidth attacks and SYN flooding. Preventive measures include using load balancers, firewalls, and cloud services to mitigate the impact of such attacks.

Uploaded by

caden87599
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

dos and ddos

1090

# Basic:
Denial-of-Service is type of attack on which service offered by a system or a
network is denied/unavailable. Service may either be denied, reduce the
functionality or prevent the access.

# Symptoms of DoS attack:


- Slow performance
- Increase in spam email ( to disrupt custmer support services )
- Unavailability of a resource
- Loss of access to a website
- Disconnection of a wireless or wired internet connection
- Denial of access to any internet services

# Distributed Denial of Service (DDoS)


- In DDoS, multiple compromised systems are involved to attack a target.
- The attacker send several connection request to the server with fake return
address, so the server can't find a user to send the connection approval.
- The authentication process waits for a certain time to close the session.
- The attacker is continuously sending requests which causing a number of
open connection on the server that lead to a denial of service.

# Categories of DoS/DDoS Attacks


**Volumetric Attacks**
Denial of Service attack performed by sending a high amount of traffic
towards the target.
Volumetric attack are focused on overloading the bandwidth capability.
**Fragmentation Attacks**
DoS attacks witch fragment the IP datagram into multiple smaller size
packets.
It requires to reassembly at the destination which requires resources
of routers.
**TCP-State-Exhaustion Attacks**
TCP-State-Exhaustion Attacks are focused on web servers, firewalls,
load balancers and other infrastructure component to disrupt connections by
exhausting their finite number of concurrent connections.
Most common state-exhaustion attack is ping of death.

# DoS/DDoS Attack Techniques


**Bandwidth Attacks - DDoS**
Bandwidth attack requires multiple sources to generate requests to
overload the target.
The goal is to consume the bandwidth completely.
Zombie servers or Botnets used to perform this type of attack.
**Service Request Floods**
Attacker flood the request towards a web service or server until it is
overloaded.
**SYN Attack / Flooding**
The attacker sending a lot of SYN request to tying up a system.
The victim waits for the acknowledgement from the Attacker, but
Attacker never send the acknowledgement.
This waiting period ties up a connection "listen to queue", that can
tie up for 75 seconds.
**ICMP Flood Attack - Ping of Death**
Flooding ICMP request without waiting for the response overwhelm the
resource of the network device.
**Permanent DoS Attack (PDoS)**
Permanent DoS attack is focused on hardware sabotage, cause
irreversible damage to the hardware.
Affected hardware require replacement or reinstall the software.
**Distributed Reflection Denial of Service (DRDoS)**
Attacker uses an intermediary victim which redirect the traffic to a
secondary victim.
Secondary victim redirects the traffic to the target.
The intermediary and secondary victim is used for spoofing the attack.
**Botnet**
Attacker compromises victims to make bot, which compromise other system
to create a botnet.
These botnets are controlled by **Command and Control server** owned by
the attacker.
This server is used to send instructions to perform the attack.

# Tools

- Nmap DOS Script


- Hping3
- LOIC - Low Orbit Ion Cannon
- MSF Auxiliary
- Hulk - Github

# Preventive Measures
- Use Load Balancers.
- Protect your network with Network Firewall. -- IDS / IPS
- Implement Web Application Firewall.
- Take Help from Cloud, they have more bandwidth than an enterprise would,
which can help in large volumetric attacks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy