5
DOS AND DDOS ATTACKS DOS ATTACKS:- Denial of Service (DoS) attack is an attack against any system component that attempts to force that system component to limit, or even halt, normal services. Only one person and one server is involved in DoS attack. In easy language, DoS is the continous attempt or receiving a packet of data from a particular websites, it may be done intentionally or unintenionally. TYPES OF DoS ATTACKS:- 1.Bandwidth attacks 2.Protocol attacks 3.Logic attacks TECHNIQUES USED IN DoS ATTACKS:- 1.COMMAND PROMPT METHOD:- It is a technique which uses command prompt. Just open the cmd and write the following there: Ping (i.p.of the victim) t(e.g ping 192.168.25.1 t),then a victims site will be busy in replying us like shown below. So victims site can be shutdown using this method i.But it can take some time.

dos n ddos

Embed Size (px)

Citation preview

Page 1: dos n ddos

7/31/2019 dos n ddos

http://slidepdf.com/reader/full/dos-n-ddos 1/5

DOS AND DDOS ATTACKS

DOS ATTACKS:-

Denial of Service (DoS) attack is an attack against any system

component that attempts to force that system component to limit, or

even halt, normal services. Only one person and one server is involved

in DoS attack.

In easy language, DoS is the continous attempt or receiving a packet of 

data from a particular websites, it may be done intentionally or

unintenionally.

TYPES OF DoS ATTACKS:- 

1.Bandwidth attacks

2.Protocol attacks

3.Logic attacks

TECHNIQUES USED IN DoS ATTACKS:-

1.COMMAND PROMPT METHOD:-

It is a technique which uses command prompt. Just open the cmd and

write the following there:

Ping (i.p.of the victim) –t(e.g ping 192.168.25.1 –t),then a victims site

will be busy in replying us like shown below. So victims site can beshutdown using this method i.But it can take some time.

Page 2: dos n ddos

7/31/2019 dos n ddos

http://slidepdf.com/reader/full/dos-n-ddos 2/5

 

2.USING RDoS TOOL:-

This is a website DOS attacking technique done by a tool called rDOS. It

is build to attack a website having open vulnerable port. In this you

have to enter the victim’s ip and a particular port for dos attack.

3.USING CRAZY PINGER:-

Crazy pinger is an network IP DoS attack application help you to flood areuired IP with lots of packets and making it busy in replying and at last

performing denial of services attack .Using this we can achieve a fastest

dos attck because using this software we can open lots of pinging

windows, which will individually attack the victim.

Page 3: dos n ddos

7/31/2019 dos n ddos

http://slidepdf.com/reader/full/dos-n-ddos 3/5

 

DDOS ATTACKS:-

Distributed Denial of Service (DDoS) attack is a DoS attack that occurs

from more than one source, and/or from more than one location, atthe same time.In DDoS more than one person and one server is

involved.

Often, the DDoS attackers are not aware that they are engaging in a

DoS attack against a site, and are duped into joining the attack by a

third party.

e.g.:- When P.T.U. results are out, we open the website to seeresult,but most of that particular time a rush appears to that site, so a

deadlock is appeared, so it is a kind of DDoS attack but done in a

unintensional way.

TOOL FOR DDoS:-

Tool used for DDoS is low orbit ion cannon.

It is very easy to use, you just have to enter the URL or IP and lock it.

Then select the attack option and then all DoS n DDoS work will do this

software.It is preferred for DDoS because it can flood the server with

both tcp and udp packets.

Page 4: dos n ddos

7/31/2019 dos n ddos

http://slidepdf.com/reader/full/dos-n-ddos 4/5

 

REAL LIFE EXAMPLE OF DDoS:-

DDoS attack used by Anonymous group(known for DDoS attacks) take

down the master card and visa card websites. So due to this master

card loses a number of crore rupees in a single day. So it can be very

dangerous.

DDOS COUNTER MEASURE:-

1. Insist on traffic charts ‘directly’ by the datacenter. If you have taken

hosting from a reseller, get the traffic charts and contact the datacenter

directly to confirm.

2. If at any point in time your hosting provider / reseller is providing

obstructions in validating the DDoS attack and its size, etc. Go direct. It

is your right to ask and verify.

3. Never believe what your host provider tells you, until and unless it

has been validated by the datacenter.

Page 5: dos n ddos

7/31/2019 dos n ddos

http://slidepdf.com/reader/full/dos-n-ddos 5/5

4. Try to contact the datacenter (you will have to be a little persistent)

but try to talk to some senior Network

Engineer and get more on the ‘type’ of DDoS attack that is happening.

Try to get some captured packets of the attack. Anything and

everything you can get out of them – is a plus.

5. Be VERY meticulous. Write everything down.

6. Take notes. All of it – write it down.

7. Ask for names and designations.

8. Note down the time and date when you call someone.

9. Make a timeline of events, when the attack started, when were you

informed, etc. Why? Because DDoS (be it recipient) can/could become

messy, legally/lawfully speaking.

10. If you have noted everything down. You save your own a...