0% found this document useful (0 votes)
356 views5 pages

Dos N Ddos

The document discusses DOS and DDOS attacks. DOS attacks involve one person and server to limit or halt normal services by continuously sending data packets. Common DOS attack techniques include using command prompts, RDoS tools, and crazy pinger software to flood a target with packets. DDOS attacks involve more than one person and server coordinating attacks from multiple sources simultaneously. Low Orbit Ion Cannon is a tool used for DDOS attacks. For example, Anonymous used DDOS attacks to take down Mastercard and Visa websites costing them millions. Countermeasures for DDOS include directly contacting datacenters for traffic details and attack information to validate provider claims.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
356 views5 pages

Dos N Ddos

The document discusses DOS and DDOS attacks. DOS attacks involve one person and server to limit or halt normal services by continuously sending data packets. Common DOS attack techniques include using command prompts, RDoS tools, and crazy pinger software to flood a target with packets. DDOS attacks involve more than one person and server coordinating attacks from multiple sources simultaneously. Low Orbit Ion Cannon is a tool used for DDOS attacks. For example, Anonymous used DDOS attacks to take down Mastercard and Visa websites costing them millions. Countermeasures for DDOS include directly contacting datacenters for traffic details and attack information to validate provider claims.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

DOS AND DDOS ATTACKS

DOS ATTACKS:Denial of Service (DoS) attack is an attack against any system component that attempts to force that system component to limit, or even halt, normal services. Only one person and one server is involved in DoS attack. In easy language, DoS is the continous attempt or receiving a packet of data from a particular websites, it may be done intentionally or unintenionally. TYPES OF DoS ATTACKS:1.Bandwidth attacks 2.Protocol attacks 3.Logic attacks TECHNIQUES USED IN DoS ATTACKS:1.COMMAND PROMPT METHOD:It is a technique which uses command prompt. Just open the cmd and write the following there: Ping (i.p.of the victim) t(e.g ping 192.168.25.1 t),then a victims site will be busy in replying us like shown below. So victims site can be shutdown using this method i.But it can take some time.

2.USING RDoS TOOL:This is a website DOS attacking technique done by a tool called rDOS. It is build to attack a website having open vulnerable port. In this you have to enter the victims ip and a particular port for dos attack.

3.USING CRAZY PINGER:Crazy pinger is an network IP DoS attack application help you to flood a reuired IP with lots of packets and making it busy in replying and at last performing denial of services attack .Using this we can achieve a fastest dos attck because using this software we can open lots of pinging windows, which will individually attack the victim.

DDOS ATTACKS:Distributed Denial of Service (DDoS) attack is a DoS attack that occurs from more than one source, and/or from more than one location, at the same time.In DDoS more than one person and one server is involved. Often, the DDoS attackers are not aware that they are engaging in a DoS attack against a site, and are duped into joining the attack by a third party. e.g.:- When P.T.U. results are out, we open the website to see result,but most of that particular time a rush appears to that site, so a deadlock is appeared, so it is a kind of DDoS attack but done in a unintensional way. TOOL FOR DDoS:Tool used for DDoS is low orbit ion cannon. It is very easy to use, you just have to enter the URL or IP and lock it. Then select the attack option and then all DoS n DDoS work will do this software.It is preferred for DDoS because it can flood the server with both tcp and udp packets.

REAL LIFE EXAMPLE OF DDoS:DDoS attack used by Anonymous group(known for DDoS attacks) take down the master card and visa card websites. So due to this master card loses a number of crore rupees in a single day. So it can be very dangerous. DDOS COUNTER MEASURE:1. Insist on traffic charts directly by the datacenter. If you have taken hosting from a reseller, get the traffic charts and contact the datacenter directly to confirm. 2. If at any point in time your hosting provider / reseller is providing obstructions in validating the DDoS attack and its size, etc. Go direct. It is your right to ask and verify. 3. Never believe what your host provider tells you, until and unless it has been validated by the datacenter.

4. Try to contact the datacenter (you will have to be a little persistent) but try to talk to some senior Network Engineer and get more on the type of DDoS attack that is happening. Try to get some captured packets of the attack. Anything and everything you can get out of them is a plus. 5. Be VERY meticulous. Write everything down. 6. Take notes. All of it write it down. 7. Ask for names and designations. 8. Note down the time and date when you call someone. 9. Make a timeline of events, when the attack started, when were you informed, etc. Why? Because DDoS (be it recipient) can/could become messy, legally/lawfully speaking. 10. If you have noted everything down. You save your own a...

You might also like