All Post

Common denial of services that you need to know about 

When the IP stresser is used for denial of services, it is best that you know the types which are available. First, you should understand the categories of denial of service attacks before. They include the following:

The application layer attacks 

They normally go for the application of the web, and most of the time, use great sophistication. The attacks tend to exploit the protocol of layer 7 weakness which is stack by the connection that is establishing with target, then having to exhaust the server resources through the process of monopolizing transaction. They are hard to mitigate and identify with a common example being HTTP flood attack.

Protocol based attacks

It focuses on having to exploit a weakness in the layer 3 and layer 4 of the stack protocols. Such attacks might consume the capacity of processing of the victim or else, resources that are critical like a firewall, which then results in disruption of service. The ping of death and sync flood are some of the examples. 

Volumetric attacks

They send a high volume of traffic to saturate the bandwidth for the victim. The volumetric attacks are normally very easy in generating through using techniques that are amplified and thus, the common attack forms. UDP floods NTP amplification, TCP flood, and the DNS amplification are a few of the examples. 

The common attacks of denial of service

The goal of DDoS or DoS is to ensure that it consumes enough network or server resources to ensure the system gets unresponsive to the requests which are legitimate. 

    • Syn flood: It is a SYN request succession that is directed to the system that is targeted, attempting to overwhelm it.  The attack does target the sequence of TCP connection exploits which is referred to as handshake of 3-way.
  • HTTP floods:It is an attack type where the HTTP POST or the GET requests are utilized in attacking the web server.
  • UDP Flood: It is type of attack where ports that are random on the target get overwhelmed by the IP booters which contain the datagrams of the UDP.
  • The ping of death: The attacks involve sending of IP packets deliberately, larger than the ones which are allowed by the protocol of IP.  The IP/TCP deals of fragmentation deals with larger packets through having to break them done in smaller packets of IP.  If the packets happen to be larger when placed together, then tend to be larger than the 65536 bytes that are allowed, with the legacy servers having to break most of the time. It is something which can be fixed in the modern systems.  Ping flood is the incarnation in present day of the attack.
  • ICP protocol attacks: They are attacks happening on the IMCP protocol, taking advantage of the fact that, each of the request has to be processed by the server long before a response is able to be sent back. ICMP flood, smurf attack, and the ping flood is what takes advantage of the same through inundating the server with ICMP’s requests without having to wait for a response. 

Related Articles

Leave a Reply

Back to top button