Translate

Saturday, 21 July 2012

DDOS AND DOS PROTECTION TOOL


DOS PROTECTION TOOL
Net flower analyzer
d-guard anti-dos firewall
wan guard
intu guard
fort guard

DOS And DdOS PArT 2

In 1st part we have studied about some dos attack.
So lets talk about other type of DoS AttAck
Peer-To-Peer Attacks:
Peer-To-Peer attacks,attackers instruct client of peer-to-peer file sharing hubs to disconnect from thier network and to connect to fake website
it normally found in network using dc++ protocol, which allow the exchange of file between instant messaging client.

Permanent Dos Attack or PHLASHING::
Permanent Dos attack i also known as phlashing,it cause irreversible damage to system hardware.
It sabotage the system hardware, requiring victim to change the hardware.
 this attack is carried out by a method "BRICKING THE SYSTEM"
using this method attacker send fraudulent  hardware update to the victim 



APPLICATION LEVEL FLOOD ATTACK:
Application level flood attack result in loss of service of a particular network such as email, network resources like printer etc ,
Using this attack, attacker destroys the programing code of application and files in affected system.
Using application flood attack, attacker attempt to :
Flood application to legitimate user
Disrupt services to a particular user for example blocking  some one by invalid logins attempts
Jams the application based database by making malicious SQL query
BOTNETS
These are software application that run  automated tasks over the internet and perform simple repetitive tasks ,such as web spidering (crawling ) nad search engine index.
A botnet is a huge network of compromised system and can be used by the intruder to create a DDOS or DOS attack
SOFTWARE FOR BOTNETS
Botnet trojan :shark 


Poison ivy :botnet command and control
 HARDWARE TOOL FOR BOTNETs
Plug bot




DDOS ATTACK TOOL
Low orbit ion canon
It is best tool for DDOS Attack 


Sunday, 15 July 2012

DOS ATTACK PART 1

DOS INTRODUCTION
Its an attack on computer or a network which prevents legitimates use of its resources
In DOS attack ,attacker flood a victim system with non-legitimates service request or traffic
to overload its resources ,which prevents it from performing intended tasks


SYMPTOMS OF DOS ATTACK:

  1. unusually slow network performance
  2. Dramatic increase in the amount of spam emails received
  3. Unavailability of a particular website 
  4. Inability to access any website
DOS ATTACK TECHNIQUE:
  • Bandwidth attack
  • Service request flood
  • Syn flood attack
  • ICMP flood attack
  • Pear to pear attack 
  • Permanent DOS
  • Application level flood attack
  • Sending or receiving file over network(it works in network only)
  • using cain and abel arp poisoning attack(for network only)
BANDWIDTH ATTACK:
  • A single user cannot generate enough request to flood network equipment ;hence DDOS is used 
  • Attacker use botnets to carryout DDOS
  • whole bandwidth is flooded with fake requests and no bandwidth is available for legitimate users.
SERVICE REQUEST FLOOD:
  • An attacker or group of zombies(bots) attempts to exhaust server resources by setting up tearing down tcp connections
  • it initiates a request on every connection
  • service request flood attacks flood servers with ahigh rate of connection from a valid source
SYN ATTACK:
The attack exploits the three-way handshake method
Attacker send fake TCP SYN request to the the target sever
the target machine send back the SYN ACK packet and wait for the response to complete the handshake
the target machine donot get ACK because the source address is fake


ICMP FLOODING ATTACK:
ICMP is atype of DoS attack in which a large amount of packets of fake source is send to target server in order to crash it and cause stop responding to TCP/IP requests
After the ICMP threshold is reached, the router rejects further ICMP echo requests from all the address in the same security zone for the remainder of the crrent second and next second as well