Ddos-deflate Installation and Configuration
1, installation
The code is as follows
Copy Code
wget http://www.inetbase.com/scripts/ddos/install.shChmod 0700 install.sh./install.sh
2, configuration
The configuration file is/usr/local/ddos/ddos.conf and is configured as follows by default
The code is as follows
Initiating an SSH attack host IP Address listTohoku University http://antivirus.neu.edu.cn/scan/ssh.phpThe following IP address attacks the SSH service, significantly increasing the likelihood of the host becoming a broiler. Network management is strongly recommended to bloc
There are 4 ways to execute a shell command through Python, which is described here as a common use.Os.system, Os.popen, commands, subprocessNext introduce the use of subprocessThrough the Python log analysis, get to the attack source IP address, collect writes to the MySQL databaseMySQL is as follows:650) this.width=650; "Src=" https://s1.51cto.com/wyfs02/M01/9A
1. Common DDos attack types
SYN Flood: it is currently the most popular DoS (DoS attacks) and is a type of TCP connection request that uses TCP protocol defects to send a large number of forged TCP connection requests, so that the attacked party's resources are exhausted (the CPU is full or the memory is insufficient.
Smurf: This attack sends a packet with a spec
This article mainly describes the DDoS attack instance SYN flood attack, we all know Syn-flood is currently the most widely used DDoS attack means, the earlier DOS means in the distributed phase of the development has also experienced the process of the bridge.
Syn-flood
this is a manipulative puppet machine, the hacker itself is still safe. The number of control puppet machines is relatively small, usually one can control dozens of of attack machines, the collation of a computer log to the hacker is much easier, so from the control machine to find the hacker's ability is also greatly reduced.
How does a hacker arrange a DDoS attack
Distributed denial of attack (DDOS) software tfn2k attack and defense
First of all, the purpose of my writing this article is not what I want to be hacker and so on, and I do not encourage anyone to use it to do something detrimental to others, I just want one more
Some people pay attention to network security, together research and defense of DOS. Because I wa
will not allow him to access it. It is regarded as a Refresh, and a time parameter can be added to allow access for how long, in this way, access to time-consuming pages is restricted, which has almost no impact on normal customers.3. the HTTP_X_FORWARDED_FOR variable sent by the proxy is used to determine the real IP address of the machine attacked by the proxy. This can be used to find the attacker. Of c
by a DDoS attack. Hackers use all computers in the network to attack victims, instead of occupying these spoofed hosts in advance. This is a Smurf attack. DRDoS attacks are based on this principle. Hackers also use a special packet sending tool to first send SYN connection request packets that have forged the source
1k, the resources occupied by this time is purely bandwidth resources, even if the system does not solve the problem of limitations, But it doesn't matter, for the problem of the network layer, we can make restrictions on the network layer, we only need on the network to reach our IP of all the non-TCP packets such as UDP and ICMP protocols are prohibited, but we do not have their own servers and lack of control over network equipment, At present, by
communication is 1: 73, and the data volume ratio is 234 bytes: 73 × 482 bytes, which is approximately equal to 1: 562. The calculation result is as follows: MB of attack traffic can be obtained for 10 MB of communication traffic, that is, 5 GB of attack traffic. It is precisely because of this command's non-equivalent exchange (1: 562 of Compensation), UDP Communication ambiguity (no three-way handshake v
In linux, the most common way to defend against ddos attacks is to install DDoS deflate to prevent or mitigate ddos attacks. However, there are other methods to use. I will introduce them below.
Introduction to DDoS deflate
DDoS deflate is a free script for defending against
when the attack, the request of not this list is discarded, greatly reducing the performance pressure. For domain names, implement the same domain name white list mechanism, the non-white list of domain name resolution requests, do discard processing.
1.5. Slow connection Attack DefenseSlowloris attack defense is relatively simple, the main program has two.
The
Figure
Iii. DDOS attack methods
3.1 SYN Flood Attack
SYN-Flood attacks are the most common DDoS attacks on the current network and the most classic denial-of-service attacks. They use a defect in TCP implementation, by sending a large number of a
Ion Canon)
LOTC is one of the most popular Dos attack tools. The tool was used by anonymous hackers in last year's popular hacker group to attack cyber attacks on many large companies.
It can be implemented by using a single user Dos attack on a small server, the tool is very easy to use, even if you are a beginner. This tool performs Dos attacks by sending UDP,
According to the network related news, recently Beijing network supervisor and Interpol, successfully cracked a network security company employees using hacker means DDoS attacks, to a domestic signature network game server launched a flood trip, lasted one months of server paralysis to the game directly caused by millions of economic losses. During the attack, the game security engineer allegedly changed t
. You only need to know the server's IP address or URL, the other is to the tool.
Download Loire loic:http://sourceforge.net/projects/loic/
2, Xoic
Xoic is another good Dos attack tool. It performs Dos attacks on any server based on the port and protocol that the user chooses. Xoic developers also claim that Xoic is more powerful than Loic in many ways.
Generall
can not normally use the service. For example, hackers try to use a large number of packets to attack the general bandwidth of a relatively small number of dial-up or ADSL users, the victim will find that he is not connected to the site or the response is very slow.
DoS attacks are not an intrusion into the host nor can steal information on the machine, but the same will cause damage to the target, if the target is an E-commerce site will cause cust
information.
(3) Through IP spoofing to hide the real location of attackers and the use of node mobility to enable the rapid transfer of the source of attack, which makes the tracking of the source of the attack becomes extremely difficult. To some extent, the research of DDoS at
How to check whether the Linux server is under DDOS attack or linuxddos
Address: http://www.phpthinking.com/archives/427
Log on to your server and run the following command as the root user to check whether your server is under DDOS Attack:netstat -anp |grep 'tcp\|udp' | awk '{print $5}' | cut -d: -f1 | sort | uniq -c
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.