Translate

Saturday, 21 July 2012

DOS And DdOS PArT 2

In 1st part we have studied about some dos attack.
So lets talk about other type of DoS AttAck
Peer-To-Peer Attacks:
Peer-To-Peer attacks,attackers instruct client of peer-to-peer file sharing hubs to disconnect from thier network and to connect to fake website
it normally found in network using dc++ protocol, which allow the exchange of file between instant messaging client.

Permanent Dos Attack or PHLASHING::
Permanent Dos attack i also known as phlashing,it cause irreversible damage to system hardware.
It sabotage the system hardware, requiring victim to change the hardware.
 this attack is carried out by a method "BRICKING THE SYSTEM"
using this method attacker send fraudulent  hardware update to the victim 



APPLICATION LEVEL FLOOD ATTACK:
Application level flood attack result in loss of service of a particular network such as email, network resources like printer etc ,
Using this attack, attacker destroys the programing code of application and files in affected system.
Using application flood attack, attacker attempt to :
Flood application to legitimate user
Disrupt services to a particular user for example blocking  some one by invalid logins attempts
Jams the application based database by making malicious SQL query
BOTNETS
These are software application that run  automated tasks over the internet and perform simple repetitive tasks ,such as web spidering (crawling ) nad search engine index.
A botnet is a huge network of compromised system and can be used by the intruder to create a DDOS or DOS attack
SOFTWARE FOR BOTNETS
Botnet trojan :shark 


Poison ivy :botnet command and control
 HARDWARE TOOL FOR BOTNETs
Plug bot




DDOS ATTACK TOOL
Low orbit ion canon
It is best tool for DDOS Attack 


No comments:

Post a Comment