Unit 9 DOS Attack
Unit 9 DOS Attack
Introduction
Victims of DoS attacks often target web servers of high-profile organizations such
as banking, commerce, and media companies, or government and trade
organizations. Though DoS attacks do not typically result in the theft or loss of
significant information or other assets, they can cost the victim a great deal of
time and money to handle.
In this unit, you will learn how Denial-of-Service (DoS) attack. You will also learn the
different types of attacks, DoS Protection: Prevent an attack.
Learning Objectives
Page 1 of 9
a) Understand what is DoS Attack?
b) Differentiate the types of Dos Attacks
c) Perform how DoS attacks work
d) Understand DoS attack tools
e) Understand the DoS Protection: Prevent an attack
f) Hacking Activity: Ping of Death and Launch a DOS attack
Presentation of Content
Cutting off some business from the internet can lead to significant loss of business
or money. The internet and computer networks power a lot of businesses. Some
organizations such as payment gateways, e-commerce sites entirely depend on
the internet to do business.
In this tutorial, we will introduce you to what denial of service attack is, how it is
performed and how you can protect against such attacks.
Page 2 of 9
How DoS attacks work
Let’s look at how DoS attacks are performed and the techniques used. We will
look at five common types of attacks.
Ping of Death
The ping command is usually used to test the availability of a network resource. It
works by sending small data packets to the network resource. The ping of death
takes advantage of this and sends data packets above the maximum limit
(65,536 bytes) that TCP/IP allows. TCP/IP fragmentation breaks the packets into
small chunks that are sent to the server. Since the sent data packages are larger
than what the server can handle, the server can freeze, reboot, or crash.
Smurf
This type of attack uses large amounts of Internet Control Message Protocol
(ICMP) ping traffic target at an Internet Broadcast Address. The reply IP address is
spoofed to that of the intended victim. All the replies are sent to the victim instead
of the IP used for the pings. Since a single Internet Broadcast Address can support
a maximum of 255 hosts, a smurf attack amplifies a single ping 255 times. The
effect of this is slowing down the network to a point where it is impossible to use it.
Buffer overflow
A buffer is a temporal storage location in RAM that is used to hold data so that
the CPU can manipulate it before writing it back to the disc. Buffers have a size
Page 3 of 9
limit. This type of attack loads the buffer with more data that it can hold. This
causes the buffer to overflow and corrupt the data it holds. An example of a
buffer overflow is sending emails with file names that have 256 characters.
Teardrop
This type of attack uses larger data packets. TCP/IP breaks them into fragments
that are assembled on the receiving host. The attacker manipulates the packets
as they are sent so that they overlap each other. This can cause the intended
victim to crash as it tries to re-assemble the packets.
SYN attack
SYN is a short form for Synchronize. This type of attack takes advantage of the
three-way handshake to establish communication using TCP. SYN attack works by
flooding the victim with incomplete SYN messages. This causes the victim machine
to allocate memory resources that are never used and deny access to legitimate
users.
Page 4 of 9
• Attacks such as SYN flooding take advantage of bugs in the operating
system. Installing security patches can help reduce the chances of such
attacks.
• Intrusion detection systems can also be used to identify and even stop
illegal activities
• Firewalls can be used to stop simple DoS attacks by blocking all traffic
coming from an attacker by identifying his IP.
• Routers can be configured via the Access Control List to limit access to the
network and drop suspected illegal traffic.
Enter the command ipconfig. You will get results similar to the ones shown below
For this example, we are using Mobile Broadband connection details. Take note
of the IP address. Note: for this example to be more effective, and you must use
a LAN network.
Switch to the computer that you want to use for the attack and open the
command prompt
We will ping our victim computer with infinite data packets of 65500
Page 5 of 9
Enter the following command
HERE,
Flooding the target computer with data packets doesn’t have much effect on
the victim. In order for the attack to be more effective, you should attack the
target computer with pings from more than one computer.
The above attack can be used to attacker routers, web servers etc.
If you want to see the effects of the attack on the target computer, you can open
the task manager and view the network activities.
Page 6 of 9
If the attack is successful, you should be able to see increased network activities.
• Download Nemesy
from http://packetstormsecurity.com/files/25599/nemesy13.zip.html
• Unzip it and run the program Nemesy.exe
• You will get the following interface
Page 7 of 9
Enter the target IP address, in this example; we have used the target IP we used
in the above example.
HERE,
• 0 as the number of packets means infinity. You can set it to the desired
number if you do not want to send, infinity data packets
• The size field specifies the data bytes to be sent and the delay specifies the
time interval in milliseconds.
The title bar will show you the number of packets sent
Click on halt button to stop the program from sending data packets.
You can monitor the task manager of the target computer to see the network
activities.
Page 8 of 9
Summary
Page 9 of 9