MOD 10 - Denial of Service Flashcards
Slowloris attack
DOS attack against a web server by sending many partial HTTP requests. Server opens multiple connections, waiting for the requests to complete, which never do. Attacker keeps doing this to max out the server’s connection pool, and legit users won’t be able to initiate their own requests.
Botnets
Review what a botnet is, typical setup, and Scanning Methods for Finding Vulnerable Machines
Hit-List scanning
With this technique, you first build a (hit) list of machines that might potentially be vulnerable to attack (to get them to join your botnet). Then you scan those machines. Any you can take-over, you can now have them help you to scan the rest of your list.
Ping Of Death
Sending malformed or oversized ICMP ping packets in an attempt to crash the target
SYN Flood / TCP SYN attack
Abuses the TCP 3-way handshake and sends many SYN packets (connection requests) to overwhelm the target
Zero-Day
New or unknown vulnerability for which there is no defense in place yet
*Cognitive radios
Implement Cognitive Radios in the physical layer to handle wireless jamming and scrambling attacks. These devices can automatically move your communications to an unused (un-attacked) channel.