Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How many attack methods are there for ddos?

2025-02-25 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly introduces "how many ways to attack ddos". In daily operation, I believe many people have doubts about how many ways to attack ddos. The editor consulted all kinds of materials and sorted out simple and easy-to-use methods of operation. I hope it will be helpful for you to answer the doubts about "how many ways to attack ddos?" Next, please follow the editor to study!

1.Synflood: this attack sends SYN packets to the intended host with multiple random source host addresses, but does not respond after receiving the SYN ACK of the intended host, so the intended host sets up a lot of bridging ranks for these source hosts, and because there is no ACK to maintain these ranks, resulting in a lot of resource consumption and can not provide services to the normal request.

2.Smurf: this attack sends a packet with a specific request (such as an ICMP reply request) to the broadcast address of a subnet and disguises the source address as the host address you want to attack. All hosts on the subnet answer broadcast packet requests and send packets to the attacked host, so that the host is attacked.

3.Land-based: an attacker sets the source address and intention address of a packet to the address of the target host, and then sends the packet to the attacked host through IP fraud. This kind of packet can cause the attacked host to fall into a dead loop in an attempt to establish a connection with itself, and then greatly reduce the function of the system.

4.Ping of Death: according to TCP/IP standards, the maximum length of a packet is 65536 bytes. Although the length of a packet cannot exceed 65536 bytes, the superposition of multiple segments of a packet dividend can be done. When a host receives a packet greater than 65536 bytes in length, it is subjected to a Ping of Death attack, which results in a host outage.

When 5.Teardrop:IP packets are transmitted over the network, the packets can dividend smaller segments. An attacker can complete a TearDrop attack by sending two (or more) packets. The offset of the first packet is 0, the length is N, and the offset of the second packet is less than N. In order to merge these data segments, the TCP/IP warehouse allocates unusually large amounts of capital, resulting in a lack of systematic capital and even a restart of machines.

6.PingSweep: use ICMP Echo to poll multiple hosts.

7.Pingflood: this attack sends many ping packets to the intended host in a short period of time, causing network congestion or host resource exhaustion.

At this point, the study on "how many ways to attack ddos" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report