What is DDos Attack?
A Denial of Service attack (DOS attack) or Distributed denial-of-service
attack (DDoS attack) is an attempt to make a computer or network
resource unavailable to its intended users. Although the means to carry
out, motives for, and targets of a DOS attack may vary, it generally
consists of the concerted efforts of a person, or multiple people to
prevent an Internet site or service from functioning efficiently or at
all, temporarily or indefinitely.
In a typical DDoS attack, a hacker (or, if you prefer, cracker) begins
by exploiting a vulnerability in one computer system and making it the
DDoS master. It is from the master system that the intruder identifies
and communicates with other systems that can be compromised. The
intruder loads cracking tools available on the Internet on multiple --
sometimes thousands of -- compromised systems. With a single command,
the intruder instructs the controlled machines to launch one of many
flood attacks against a specified target. The inundation of packets to
the target causes a denial of service.
How DoS Attacks are executed ?
DoS Attacks are usually executed by flooding the target servers with
unsolicited data packets in unprecedented manner. This may be done by
misconfiguring network routers or by performing smurf attack on the
victim servers. This results in ‘Capacity Overflow’, followed by Max Out
of system resources, which makes the target service unavailable, either
temporarily or permanently(In case of hardware targeted DoS attack) to
the intended users.
DOS Attack Methods
Denial of Service (DOS) attacks are intended to shut down the servers
for a period of time. To make site nonfunctional for a time the main
part of attack is DOS attack. DOS attacks are usually doing by following
methods:
1. Send unlimited amount of packets to the server.
2. Executing Malwares
3. Teardrop attack
4. Application level flood
How to Perform Attack:
* Sending unlimited packets by ping command is also known as ICMP flood. This method can be done in the following way.
Follow these steps:
1: First of all you need to know the IP address of the website you want
to crash. Use ping command in windows to get the ip address of the
website
open CMD and enter ping www.website.com And you will get target machine IP.
2: Use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open choose another website to attack.
3: Now You have target machine IP Address. Type following command in CMD
A simple DOS attack code would be:
ping {Victim IP} -t -l 20000
On command prompt window you can type the following command. This
command sends 20000 bytes of data to the IP, in a single packet. The -t
is to ping the specified host until stopped and -l is to specify the
buffer size.
DOS attack with ping flood will work only if the following cafeterias are satisfied:
1. Attacker should have higher bandwidth than the victim.
2. Victim should respond to the ping requests
Dos /DDoS Attack with Tool:
There Are Many tools to perform DOS/DDOS attack. Please note that tools
used for DoS attacks and DDoS are different. You don't need to know
about programming to understand and run these tools. These tools may be
OS specific or platform independent depending on what condition the
programmers has built the code. We Discus these tools in nest post. But
here I am giving Loic Dos Attack tool Download link. So Download this
tool n Enjoy DOS Attack.
If you like this post then don’t forget to share it and If you are
getting any problem regarding to this feel free to comment.
No comments:
Post a Comment