Tuesday, November 4, 2008

DDoS attacks common hacker techniques

DDOS attacks are now the most common way a hacker attack, the following gives a brief account of all seven of DDOS attacks.

1.Synflood: the number of random attacks by the source address of the host to host the purpose of sending SYN packets, and the purpose of the receipt of the SYN ACK after the host does not respond in this way on purpose host for the host to establish the source of a lot of connection queue , But has not received due to the ACK has been to maintain these queues, resulting in a large number of resources consumption and can not be normal to the request.

2.Smurf: the attack to a subnet broadcast address made with a specific request (for example, respond to the request of the ICMP) packet, and the source address of the disguised want to attack the host address. All on-line sub-radio hosts are to respond to the request packet to the host contract had been attacked, the host to attack.

3.Land-based: the attacker will be a source of the package address and destination address are set to host the target address, and then the IP packet through the deception of the attack were sent to the mainframe, which can packages have been created as a result of trying to attack the host And their connection to be trapped in cycle of death, to a large extent, thereby reducing system performance.

4.Ping of Death: According to the TCP / IP standards, a package of up to 65,536 bytes in length. Despite the length of a package can not be more than 65,536 bytes, but a package is divided into a number of fragments can be superimposed. When a host has received more than 65,536 bytes in length when the package is subject to a Ping of Death attacks, the attacks will cause the host downtime.

5.Teardrop: IP packet transmission network, the packets can be divided into smaller segments. An attacker can send two (or more) packets to achieve TearDrop attacks. The first package to offset 0, length N, the second of the offset package is less than N. In order to merge the data above, TCP / IP stack will be the distribution of unusually huge resources, resulting in a lack of system resources or even restart the machine.

6.PingSweep: the use of ICMP Echo hosts a number of polling.

7.Pingflood: The purpose of the attack in a short period of time to host a large number of ping packets, causing the network to plug the host or depletion of resources.

0 comments:

Post a Comment