DoS Attacks 10-01-2012, 02:01 PM
#1
Many "hackers" say that DoS attacks are for skids, but they have no idea what a DoS attack is and how to use it. 99% of those hackers only know how to buy tools and find tuts on how to use the tools
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Here are several different kinds of dos attacks as discussed below:
1. Ping Of Death
The ping of death attack sends over sized ICMP data grams to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it's commonly used to determine whether the remote host is alive.
How to launch Ping Of Death Attack
1.1. Start command
![[Image: scaled.php?server=826&filename=cmd1y.jpg...&ysize=640]](http://desmond.imageshack.us/Himg826/scaled.php?server=826&filename=cmd1y.jpg&xsize=640&ysize=640)
1.2. Type this command
And, hit enter.
![[Image: scaled.php?server=266&filename=cmd2.jpg&...&ysize=640]](http://desmond.imageshack.us/Himg266/scaled.php?server=266&filename=cmd2.jpg&xsize=640&ysize=640)
You don't need tools for this attack.
This attack is old and won't work these days.
2. Teardrop Attack
Whenever data is sent over the internet, it is broken into fragments at the source system and reassembled at the destination system. For example you need to send 4,000 bytes of data from one system to another. Rather than sending the entire chunk in a single packet, the data is broken down into smaller packets.
Example:
3. SYN - Flood Attack
In SYN flooding attack, several SYN packets are sent to the target host, all with an invalid source IP address. When the target system receives these SYN packets, it tries to respond to each one with a SYN/ACK packet but as all the source IP addresses are invalid the target system goes into wait state for ACK message to receive from source.
These half-open connections saturate the number of available connections the server is able to make, keeping it from responding to legitimate requests until after the attack ends.
How to launch a SYN Flood Attack
Here is a nice tutorial about starting attack with hping.
And HD video :
4. Smurf Attack
There are 3 users in the smurf attack–the attacker, the intermediary (which can also be a victim), and the victim. In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic.
5. UDP flood
- Wikipedia
UDP Flooder - Click
6. Distributed Denial Of Service (DDOS)
In Distributed DoS attack, there is more than 1 attack (for example 100 different attacker systems) attacking the single system. Due to higher number of attackers DDoS attack are more effective and dangerous than regular DoS attack.
Trin00 is a tool for DDOS attack.
Also, almost every botnet has a flood command.
This is enough for beginners. I will probably write more.
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Here are several different kinds of dos attacks as discussed below:
1. Ping Of Death
The ping of death attack sends over sized ICMP data grams to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it's commonly used to determine whether the remote host is alive.
How to launch Ping Of Death Attack
1.1. Start command
![[Image: scaled.php?server=826&filename=cmd1y.jpg...&ysize=640]](http://desmond.imageshack.us/Himg826/scaled.php?server=826&filename=cmd1y.jpg&xsize=640&ysize=640)
1.2. Type this command
Code:
ping ip -l 65500 -n 10000000 -w 0.00001
![[Image: scaled.php?server=266&filename=cmd2.jpg&...&ysize=640]](http://desmond.imageshack.us/Himg266/scaled.php?server=266&filename=cmd2.jpg&xsize=640&ysize=640)
You don't need tools for this attack.
This attack is old and won't work these days.
2. Teardrop Attack
Whenever data is sent over the internet, it is broken into fragments at the source system and reassembled at the destination system. For example you need to send 4,000 bytes of data from one system to another. Rather than sending the entire chunk in a single packet, the data is broken down into smaller packets.
Example:
Code:
* packet 1 will carry bytes 1-1000.
* packet 2 will carry bytes 1001-2000.
* packet 3 will carry bytes 2001-3000.
* packet 4 will carry bytes 3001-4000
3. SYN - Flood Attack
In SYN flooding attack, several SYN packets are sent to the target host, all with an invalid source IP address. When the target system receives these SYN packets, it tries to respond to each one with a SYN/ACK packet but as all the source IP addresses are invalid the target system goes into wait state for ACK message to receive from source.
These half-open connections saturate the number of available connections the server is able to make, keeping it from responding to legitimate requests until after the attack ends.
How to launch a SYN Flood Attack
Here is a nice tutorial about starting attack with hping.
Code:
http://www.binarytides.com/tcp-syn-flood-dos-attack-with-hping/
4. Smurf Attack
There are 3 users in the smurf attack–the attacker, the intermediary (which can also be a victim), and the victim. In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic.
5. UDP flood
Code:
A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a session less/connectionless computer networking protocol.
Using UDP for denial-of-service attacks is not as straightforward as with the Transmission Control Protocol (TCP). However, a UDP flood attack can be initiated by sending a large number of UDP packets to random ports on a remote host.
UDP Flooder - Click
6. Distributed Denial Of Service (DDOS)
In Distributed DoS attack, there is more than 1 attack (for example 100 different attacker systems) attacking the single system. Due to higher number of attackers DDoS attack are more effective and dangerous than regular DoS attack.
Trin00 is a tool for DDOS attack.
Also, almost every botnet has a flood command.
This is enough for beginners. I will probably write more.