Dos and ddos
-
Upload
chet-deewan -
Category
Internet
-
view
115 -
download
3
Transcript of Dos and ddos
DOS And DDOS
1
A TuToriAl on DeniAl of service ATTAcks (Dos)By: er. cheTAn GoyAlconTAcT for more TuToriAls on oTher Topics of eThicAl [email protected]@GmAil.comor visiTwww.winDowwAres.BloGspoT.com
DOS And DDOS
• This Module Includes
DOS
Types of DOS
DDOS
2
DOS (Denial Of Service)
• DOS attacks effects Availability (CIA triangle)• Denial of service attacks are totally destructive • They are simple to execute but hard to stop• The purpose of DOS attacks is to consume all
resources so that other people will not able access them
3
How DOS (Denial of Service)
• Consume host resources • For eg: Memory
» Processor
• Choke network » Increase network traffic» Consume full bandwidth
• Exploit protocols and other vulnerabilities
4
Type of DOS Attacks
• SYN Flood attack• PING of Death• Smurf Attack• Land Attack• ARP cache Poisoning DOS• Software vulnerabilities specific DOS
• Eg: SMB 2 DOS for Vista
5
DDOS
• Distributed Dos Attacks use large army of zombies to attack a system, single controller will monitor zombies
• Much more powerful than simple DOS attacks• Latest example of DDOS attacks was on Amazon
and PayPal by Wikileaks lovers• DDOS can use same steps as of DOS but here
single zombie perform that steps, but attack is combined of all.
6
DDOS
• Distributed Dos Attacks use large army of zombies to attack a system, single controller will monitor zombies
• Much more powerful than simple DOS attacks• Latest example of DDOS attacks was on Amazon
and PayPal by Wikileaks lovers• DDOS can use same steps as of DOS but here
single zombie perform that steps, but attack is combined of all.
6