Monday, 30 November 2009

What is Distributed Denial Of Service ( DDOS) PART : 1

Hi readers this time it is about another very important topic and very serious issue in the field of networking.

Distributed denial of service DDOS it's a type of attack which cause a huge damage to the network. In this type of attacks it is impossible to trace back the attacker.

If we talk about DDOS attack then we need to know some thing called DOS attack which is denial of service.
DOS is an attack in which the attacker attack the victim directly through any of the attack methods. In this case the attacker can be traced back or in other words he can be caught for doing that attack, whereas in the case of DDOS attack the attacker is very safe behind some one.

Let us see the various attack methods which is used in both DOS and DDOS attack.

* Smurf Attack:
                    This is a normal and easiest type of attack which doesn't required any special software. Basically this attack is done by sending numerous amount of  ICMP packets ( Internet control message protocol). This packets are mainly used for doing Ping and trace route. This type of attack is done just using the command prompt or shell. in unix based system.
Most of them knew this command called PING and this is the command which is used to do this smurf attack. I am not going to give the command here I am leaving it to you to do so search.
The logic behind this attack is sending this ICMP REQUEST packets to an system with someone's IP address for example: I am the attacker and I am sending ICMP REQUEST packet to an server say Google.com but with the source IP address is your system, now the reply from Google.com will reach your system rather to my system. If this ICMP REQUEST packet is send numerous number to Google, Google will also sedn the ICMP reply packet to your system.
This method is also can be reversed, if you want to attack the Google server  in this case the attacker will send the ICMP request packet to you with the source IP address as Google.com now you will be sending the packets to google but actually the request is send by me. Now the attacker is not known to the victim since there was a third person sending those packet
Here is the illustration of the attack.


So if  single person used as third person to do this type of attack it is alled DOS attack instead if there where 1000 or more pc doing the same job it will become an DDOS attack. Attacking single server or user with thousand or more user where the attacker hiding behind this actual attack is called DDOS attack.

By doing this attack what is the impact or the final result??
OK the outcome of this attack is to overwhelm the resource which the victim has. for example the bandwidth will be exited  or it will create more traffic to the particular server.

There are several other type of attack which is used in the DDOS attack which we will see in the next post. Thank you for reading. please comment and give your views.

No comments:

Post a Comment

Conformio-Online Compliance Tool Multiple Vulnerabilities

# Exploit Title: Conformio-Online Compliance Tool Multiple Vulnerabilities. # Discovered Date: 16/11/2017 # Exploit Author: Ramikan # Websi...