Denial-of-service attack (DoS attack) is
a cyber-attack.brought you by Hackfreaks.
#security #Article
This hacking method is classified into #5 important and general types. Of course, other classification methods may be used in more detail or in greater numbers for Ddos attacks in manual articles..
(1) Buffer Overflow Attack
A minor buffer attack occurs when the amount of information written in the buffer exceeds the amount predicted for it in the system memory. An attacker can rewrite the controller's routing data, and by stealing and taking control of the program, execute the code of his choice instead of the server's processes.
(2) Ping of Death Attack
Throughout the twentieth century, this method was one of the most popular DoS attacks. But today it is generally blocked and blocked. The attacker deliberately sent an envelope or IP package larger than 65,536 bytes, which is authorized by the IP protocol. In this protocol, the file is broken down into data packets at the source, and after being sent to the destination computer, the information packets are assembled at the destination and the file is rebuilt on the destination computer. But the destination operating system didn't manage to fold and lock information packets larger than the standard that the attacker had deliberately made and sent, rebooted, or even cracked easily.
(3) Smurf Attack
This attack is a way to create meaningful and annoying traffic on the victim's computer network. In this way, the attacker drowns the victim's system by sending fake Ping messages.
In this way, Johnny generates a lot of ICMP echo or ping traffic and sends it from unknown and fake sources to the victim's host. The result is a large number of ping responses that destroy the victim's system.
(4) Tear Drop
The attack involves sending pieces of cluttered information envelopes that are larger than usual but not completely piled up. These flawed packages in various operating systems cause the system to crash due to bugs in the TCP / IP protocol reset codes.
(5) SYN Attack
The attacker sends fake TCP SYN requests to the victim server. The server uses all resources to respond to received requests. But the problem is that the applicants are fake! Each response remains a semi-open connection on the server until verified by the applicant. In response, the server sends a TCP / SYN-ACK packet to the requester and waits for a response from the sender's address. However, due to the lack of a real transmitter, there is never a response. And little by little, the semi-open connections connect and saturate all possible connections to the server. So the server refuses to respond to other common users
A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, thus disrupting trade.
This hacking method is classified into #5 important and general types. Of course, other classification methods may be used in more detail or in greater numbers for Ddos attacks in manual articles..
(1) Buffer Overflow Attack
A minor buffer attack occurs when the amount of information written in the buffer exceeds the amount predicted for it in the system memory. An attacker can rewrite the controller's routing data, and by stealing and taking control of the program, execute the code of his choice instead of the server's processes.
(2) Ping of Death Attack
Throughout the twentieth century, this method was one of the most popular DoS attacks. But today it is generally blocked and blocked. The attacker deliberately sent an envelope or IP package larger than 65,536 bytes, which is authorized by the IP protocol. In this protocol, the file is broken down into data packets at the source, and after being sent to the destination computer, the information packets are assembled at the destination and the file is rebuilt on the destination computer. But the destination operating system didn't manage to fold and lock information packets larger than the standard that the attacker had deliberately made and sent, rebooted, or even cracked easily.
(3) Smurf Attack
This attack is a way to create meaningful and annoying traffic on the victim's computer network. In this way, the attacker drowns the victim's system by sending fake Ping messages.
In this way, Johnny generates a lot of ICMP echo or ping traffic and sends it from unknown and fake sources to the victim's host. The result is a large number of ping responses that destroy the victim's system.
(4) Tear Drop
The attack involves sending pieces of cluttered information envelopes that are larger than usual but not completely piled up. These flawed packages in various operating systems cause the system to crash due to bugs in the TCP / IP protocol reset codes.
(5) SYN Attack
The attacker sends fake TCP SYN requests to the victim server. The server uses all resources to respond to received requests. But the problem is that the applicants are fake! Each response remains a semi-open connection on the server until verified by the applicant. In response, the server sends a TCP / SYN-ACK packet to the requester and waits for a response from the sender's address. However, due to the lack of a real transmitter, there is never a response. And little by little, the semi-open connections connect and saturate all possible connections to the server. So the server refuses to respond to other common users
- Get link
- X
- Other Apps
Labels
Hacking
Labels:
Hacking
- Get link
- X
- Other Apps
Comments
Post a Comment