Sei sulla pagina 1di 5

Introduction to DoS Attacks

DoS attack stands for Denial of Service attack. It is an attack against any system or network to make it unavailable for the use of its users. The motive of the attack may vary from case to case. It is generally an effort of one or more people to temporarily interrupt the services of a host connected to the internet.

Effects of DoS attack:


DoS attacks are generally hosted on high profile web servers such as banks, credit card payment gateways and even root name servers. The attack is done on the target machine with external communication requests, such that it cannot respond to the legitimate traffic or responds to the request slowly. Such attacks usually lead to server overloads. Some of the effects caused by such attacks are mentioned below: Unusually slow performance. network

Unavailability of a particular websites. Inability to access any website. Etc.

Types of DoS attacks:


1. Bandwidth Attack: It is an old method of DoS attack. In this method we can slow down the system or a network by just using a ping command. You might be thinking what is a ping command?? A ping is used to check whether the connection with the network has been made or not. It is a very basic command used in networking but can be used for such affective purposes. Go to command prompt. type ping sp IP ( the user computer or system will reply us 4 times)

This means that the DoS attack has been successful and the connection has been built up.. But if you type ping sp IP t

The computer will keep on replying us, his computers CPU usage will increase and the system will hang and finally shut down. 2. Protocol Attack: This type of attack is done on a particular protocol like http, smtp, etc. If the attack is done on HTTP then the site will not open. And if the attack is done on SMTP( simple mail transfer protocol) then the site will work properly but the e-mail will be sent very slowly.

3. Logical Attack: Logical attacks are also known as Buffer Overflow Attack. In
these types of attacks the physical memory becomes full and the CPU usage increase to 100%. The system hangs and finally shuts down.

Tools Uses For DoS Attacks: RDoS: This software is build to attack a website having open vulnerable port.
This software mainly works in Windows XP and Windows 7( 32 bit).

Crazy Pinger: Crazy Pinger is used in local area network (LAN). It is an


network IP DoS attack helps you to flood required IP with a lot of packets and making it busy in replying and at last performing denial of service attack.

Distributed Denial Of Service Attack (DDoS)


Distributed Denial of Service (DDoS) attack is a DoS attack that occurs from more than one source, and/or from more than one location, at the same time. In other words, A DDoS attack is carried out by more than one person on a targeted website, network or any victim such that the network traffic decreases and the victims network or website become inaccessible. DDoS attack does not have any prevention. But one effort can be given. It can be done by traffic sharing. Traffic sharing is that process in which more than one server has been established for maintaining a website. When we open a website, the web page and whole of that web site is kept on some server. When we ping the website, packets of data is sent and received from the server. if the limit of the server traffic is 10,000 at a time and if this limit is exceeded by even 1 the server will shut down and the webpage will crash and wont open. To solve this problem multiple servers are established or placed so that if the traffic exceeds its limits, the webpage can be redirected to the next server.

Tools Used For DDoS Attack:


Low Orbit Ion Cannon High Orbit Ion Cannon

Low orbit Ion Cannon

Real Life Cases of DDoS Attacks:

** I really hope you guys liked my work and this post proves to be knowledgeable for you.I will keep posting such stuff in near future. Just keep on admiring my work **

Potrebbero piacerti anche