Module 10 - Denial-of-Service Flashcards
- An attack on a computer or network that reduces, restricts, or prevents accessibility of system resources to its legitimate users.
- Attackers flood the victim system with non-legitimate service requests or traffic to overload its resources.
Denial-of-Service (DoS) Attack
- A coordinated attack which involves a multitude of compromised systems (Botnet) attacking a single target; thereby causing denail of service for users of the targeted system.
- 2 or more computers attacking a computer or network.
Distributed Denail-of-Service (DDoS) Attack
DoS/DDoS Attack Techniques:
A type of attack in which attackers send large volumes of ICMP echo request packets to a victim system directly or through reflection networks.
a. Ping of Death Attack
b. SYN Flood Attack
c. UDP Flood Attack
d. ICMP Flood Attack
d. ICMP Flood Attack
DoS/DDoS Attack Techniques:
The attacker send a large number of SYN request to target server (victim) with fake source IP address.
SYN–SYN/ACH, SYN–SYN/ACH, SYN–SYN/ACH, SYN–SYN/ACH, SYN–SYN/ACH, SYN–SYN/ACH
a. Ping of Death Attack
b. SYN Flood Attack
c. UDP Flood Attack
d. ICMP Flood Attack
b. SYN Flood Attack
DoS/DDoS Attack Techniques:
An attacker tries to crash, destabilize, or freeze the targeted system or service by sending malformed or oversized packets using a simple ping command.
a. Ping of Death Attack
b. SYN Flood Attack
c. UDP Flood Attack
d. ICMP Flood Attack
a. Ping of Death Attack
DoS/DDoS Attack Techniques:
- Permanent DoS, refers to attacks that cause irreversible damage to system hardware.
- This attack is carried out using a method know as “bricking a system”
Phlashing
A ________ is a huge nework of compromised systems and can be used by an attacker to launch denial-of-service attacks.
Botnet
_____ are software applications that run automated tasks over the internet and perform simple repetitive tasks, such as web spidering and search engine indexing.
Bots
DoS/DDoS Attack Tools:
_____ makes a DDoS to attack any IP address with a user selected port and a user selected protocol.
a. High Orbit Ion Cannon (HOIC)
b. Low Orbit Ion Cannon (LOIC)
a. High Orbit Ion Cannon (HOIC)
DoS/DDoS Attack Tools:
____ can be used on a target site to flood the server with TCP packets, UDP packets, or HTTP requests with the intention of disrupting the service of a particular host.
a. High Orbit Ion Cannon (HOIC)
b. Low Orbit Ion Cannon (LOIC)
b. Low Orbit Ion Cannon (LOIC)