Module - 16 - Denial of Servicea
Module - 16 - Denial of Servicea
Land Attack
In this attack, spoofed packets with identical source and destination IP addresses are sent to
the target. The target becomes confused and experiences a crash. Most modern devices have
measures to counteract land attacks.
Smurf Attack
This attack involves sending ICMP echo requests to a network’s broadcast address while
spoofing the target’s IP address. Devices on the network reply to the target, overwhelming it
with echo replies.
3. Botnet Distribution
What is a Botnet?
A botnet is a network of compromised devices, also known as bots, that are controlled by an
attacker to perform coordinated malicious activities, such as DDoS attacks.
4. DoS/DDoS Tools
Common tools used for DoS/DDoS attacks include:
1. Low Orbit Ion Cannon (LOIC): An open-source stress testing tool.
2. High Orbit Ion Cannon (HOIC): An advanced tool capable of HTTP flooding.
3. Hping: A packet crafting tool often used for SYN Floods.
4. Xerxes: A specialized tool for HTTP DDoS attacks.
5. Botnet Frameworks: Tools like Mirai or Zeus to control botnets.
5. Identification & Prevention Techniques & Tools
Identification Techniques
1. Traffic Analysis: Monitoring for abnormal traffic patterns.
2. Anomaly Detection Systems: Using machine learning to identify unusual activities.
3. Network Monitoring Tools: Tools like Wireshark or Nagios to detect high traffic rates.
Prevention Techniques
1. Rate Limiting: Restricting the number of requests per IP.
2. Firewalls: Configuring firewalls to block malicious traffic.
3. Content Delivery Networks (CDNs): Using CDNs to absorb traffic.
4. DDoS Protection Services: Services like Cloudflare or Akamai.
5. IP Blacklisting/Whitelisting: Blocking known malicious IPs and allowing trusted IPs.