The ultimate weapon-ddos of hackers

Source: Internet
Author: User

When it comes to the ultimate weapon of hackers, it really has to be about DDoS. Can some users of this thing is not very know, but the people engaged in computer security is often heard this name, its degree than the fear of the grave. After all, this DDoS has some place to be so fearful, below will make some brief elucidation to you.

In general, the DOS approach is your network's TCP/IP interior layout, and these attacks are divided into three kinds: one is the use of TCP/IP protocol gap, two is the use of a given TCP/IP protocol stack software shortcomings; The third is the rough assault of continual testing.

Speaking of the damage of the hacker software, it is not possible to talk about the network security sector Kaishan Zushi cert was invaded by the operation. May 22, Tuesday, this original only Pittsburgh Carnegie Mellon University Cert Exchange Center, an ordinary day. But on this day, cert, considered the authority of computer security, will be kicked out of the network by hackers ' discrete service rejections (DDoS). Other, Microsoft, Yahoo and Exodus have been in the past 12 months of DDoS has been tricky; can be the next policy is that you may be your client oh. In fact, if someone really wants to use DDoS to invade your service and make it paralyzed, they must be able to do, and is impossible.

"Discrete service rejection" is mainly done by blocking your service from sending out the services you provide. To achieve this, hackers can have many ways, such as the most typical Outlook e-mail worm Melissa and its peers, because they can instigate the outlook order of the client to the service constantly announced full of worms letter until the service is under the pressure of paralysis. When many people talk about the DOS invasion process, they think of the use of many useless information to plug the network in order to reach the intention to paralyze it. In fact, this is only a typical way to compare. In fact, there is another way is also very useful, that is called the use of the service resource approach to the invasion. This kind of invasion is carried out with a low speed modem connection.

In the meantime, the Mazu Network company depicts Trafficmaster inspector is a good thing to resist DDoS. Through the continuous use of G-Unit of the Ethernet speed of data viewing, and can be traced far back to the data history. In short, Mazu expects to detect network attacks in real time, and then let the normal packets pass together to block the DDoS packets. This maintenance of the network makes it suitable for ISPs and data Center service.

For corporate users, it is possible to install software such as firewalls and Zone Alarm Pro, such as Zone Labs, which can protect against or inhibit DDoS attacks. Other, corporate users can also seek assistance from ASTA network companies. Asta Network has developed a vantage system that can play a similar effect to anti-virus software, primarily as a preventive effect, and when it discovers a possible incursion, the Vantage system prompts the network administrator, The network administrator can then use the routing filter to block the attacks by blocking the network service on the way to the data delivery. And this system is analyzed and searched for the characteristics of DDoS attacks that can be invaded before the usual invasion, it continues to network packets and known DDoS packets, these stereotypes Bauro to the Domain Name Service (DNS) of the non-standard data flow, if it found the problem of cent, will prompt the network administrator.

As has been said above, one of the ways to damage DDoS is to corrupt the TCP/IP protocol. The most typical of these is ping of death attacks, which create a maximum length of 65,535 bytes of IP packets beyond the IP specification. (Sinbad Note: Ping ' O death invade is to send multiple IP fragments, the total length beyond the 65535;JOLT2 is to send a very large offset packet) when this "puffy" packet arrives, it makes a weak tcp/ IP protocol software and operating system of the service device paralysis. The other one to invade, such as teardrop, it is mainly the use of the system to reorganize the process of IP packet gap operations. A packet of data from the other end of the internet may be split into smaller data packets on the way to you. Each of these datagrams has the header of the starting IP datagram, along with an offset byte to indicate which bytes it has in the original datagram. With this information, a normally cut data message can be assembled from scratch in its intent, and the network can function without interruption. When a teardrop attack begins, your service will be bombed by an IP packet with a stacked offset field. If your service or router does not lose these packets and if you attempt to reorganize them, your service will soon be paralyzed. If your system is updated in time, perhaps you have a firewall that can thwart teardrop packets, you shouldn't have any trouble.

URL: http://www.zkddos.com (DDoS attack)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.