Sie sind auf Seite 1von 5

DOS AND DDOS ATTACKS

DOS ATTACKS:Denial of Service (DoS) attack is an attack against any system component that attempts to force that system component to limit, or even halt, normal services. Only one person and one server is involved in DoS attack. In easy language, DoS is the continous attempt or receiving a packet of data from a particular websites, it may be done intentionally or unintenionally. TYPES OF DoS ATTACKS:1.Bandwidth attacks 2.Protocol attacks 3.Logic attacks TECHNIQUES USED IN DoS ATTACKS:1.COMMAND PROMPT METHOD:It is a technique which uses command prompt. Just open the cmd and write the following there: Ping (i.p.of the victim) t(e.g ping 192.168.25.1 t),then a victims site will be busy in replying us like shown below. So victims site can be shutdown using this method i.But it can take some time.

2.USING RDoS TOOL:This is a website DOS attacking technique done by a tool called rDOS. It is build to attack a website having open vulnerable port. In this you have to enter the victims ip and a particular port for dos attack.

3.USING CRAZY PINGER:Crazy pinger is an network IP DoS attack application help you to flood a reuired IP with lots of packets and making it busy in replying and at last performing denial of services attack .Using this we can achieve a fastest dos attck because using this software we can open lots of pinging windows, which will individually attack the victim.

DDOS ATTACKS:Distributed Denial of Service (DDoS) attack is a DoS attack that occurs from more than one source, and/or from more than one location, at the same time.In DDoS more than one person and one server is involved. Often, the DDoS attackers are not aware that they are engaging in a DoS attack against a site, and are duped into joining the attack by a third party. e.g.:- When P.T.U. results are out, we open the website to see result,but most of that particular time a rush appears to that site, so a deadlock is appeared, so it is a kind of DDoS attack but done in a unintensional way. TOOL FOR DDoS:Tool used for DDoS is low orbit ion cannon. It is very easy to use, you just have to enter the URL or IP and lock it. Then select the attack option and then all DoS n DDoS work will do this software.It is preferred for DDoS because it can flood the server with both tcp and udp packets.

REAL LIFE EXAMPLE OF DDoS:DDoS attack used by Anonymous group(known for DDoS attacks) take down the master card and visa card websites. So due to this master card loses a number of crore rupees in a single day. So it can be very dangerous. DDOS COUNTER MEASURE:1. Insist on traffic charts directly by the datacenter. If you have taken hosting from a reseller, get the traffic charts and contact the datacenter directly to confirm. 2. If at any point in time your hosting provider / reseller is providing obstructions in validating the DDoS attack and its size, etc. Go direct. It is your right to ask and verify. 3. Never believe what your host provider tells you, until and unless it has been validated by the datacenter.

4. Try to contact the datacenter (you will have to be a little persistent) but try to talk to some senior Network Engineer and get more on the type of DDoS attack that is happening. Try to get some captured packets of the attack. Anything and everything you can get out of them is a plus. 5. Be VERY meticulous. Write everything down. 6. Take notes. All of it write it down. 7. Ask for names and designations. 8. Note down the time and date when you call someone. 9. Make a timeline of events, when the attack started, when were you informed, etc. Why? Because DDoS (be it recipient) can/could become messy, legally/lawfully speaking. 10. If you have noted everything down. You save your own a...

Das könnte Ihnen auch gefallen