Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

DoS Attacks


DoS Attacks

By ghostghost | 6494 Reads |
0     0

Denial of Service Attacks

I decided to write this because it's the most common used attack methods and people don't really seem to know what they are and how they're performed.

So I'll just list the well-known ones right here:

  • DDoS

Distributed Denial of Service. Simply make a lot of computers send heaps of data to flood a server.

  • IGMP Attack

Based on an error in the Internet Group Management Protocol which is used by routers to decide whether or not users are allowed on a certain subnet. The protocol usually sends out multicasting packets which aren't all that big. With an IGMP attack you send much bigger packets so that the protocol can't handle them. Consequence? Blue screen of death and a terminated network connection.

  • SYN Flooding

Uses the Three Way Handshake by constantly connecting with the server without disconnecting. There's no stopping this one.

  • Finger attack

Only to be used in a unix network. Costs the server a lot of HDD space, memory and bandwith which makes it crash. It's simply repeatedly calling finger:

finger @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@hostname

  • Teardrop attack

When a way too large packet is sent via the Internet Protocol (IP) it splits it up into fragments. Every fragment packet has an offset to the beginning of another packet so that they can be put together again by the next system it will reach. With the teardrop attack, the attacker puts a confusing offset value in on of the fragments (not the first). Most of the time this causes the system to crash.

  • ICMP Flood

Repeatedly sending packets to the server making it crash (best done distributed). Make a batch file with the following lines:

:loop ping [hostname] -f goto loop

Change [hostname] ;)

  • Smurf attack

Same as ping of death, but with a spoofed return address.

  • Fraggle attack:

Same as Smurf attack, but without using another victim to spoof the return address.

  • trin00

http://staff.washington.edu/dittrich/misc/trinoo.analysis has to do with solaris.

Now, as you can see DoS attacks don't have to be stupid/dumb (skiddies perform them a lot though). I personally think the Teardrop attack is quite original. :-)

HvT

Comments
ghost's avatar
ghost 19 years ago

Nice, I did something similar a while back. :)

ghost's avatar
ghost 19 years ago

Vote people, I need only one more! :)

ghost's avatar
ghost 19 years ago

okay i will vote i liked it im gunnna make one in vb and how long do u think on average it would take to crash a regular home computer and im thinking about doin this at my school using all the school computers to take down a local bitches computer lol god i love being gray!B)

ghost's avatar
ghost 19 years ago

Ok, then vote ;)

It depends on their connection/pc/amount of attacking pc's. Won't take long if you use all the school pc's.

n3w7yp3's avatar
n3w7yp3 19 years ago

HvT, what you called the Ping of Death is more accuratly referred to as an ICMP flood. The ping of death was an attack that would send a packet greater than 65536 bytes to a host. this would cause it to go belly up. it has been patched for quite a long time.

ghost's avatar
ghost 19 years ago

My mistake, thanks! :)