Denial of service Introduction, DOS classification, Personal DOS classification method, Syn-flood, IP address spoofing _dos

Source: Internet
Author: User


DOS: is the abbreviation for the denial of service, the denial of service, not the DOS operating system, which causes Dos attacks to be called Dos attacks, and is designed to make the computer or network unable to provide normal services. The most common Dos attacks are computer network bandwidth attacks and connectivity attacks.
DDoS: Distributed Denial-of-service (ddos:distributed denial of service) attacks refer to the use of client/server technology to unite multiple computers as an attack platform to launch DDOS attacks against one or more targets. Thus multiplying the power of denial of service attacks.
Distributed processing is a computer system that coordinates large-scale information processing tasks in a coordinated manner under the unified management control of a control system by connecting multiple computers with different locations, or with different functions, or with different data in a communication network. The
Denial of service attack does not simply send a large amount of data to make the target host not functioning properly, and we can also send several packets through a system vulnerability to enable the target host to achieve the denial of service.
Hackers find vulnerabilities, plant zombie programs, make machines Zombie,
and attack traffic and normal access traffic are not easy to distinguish. The

Udpflood is an increasingly rampant, traffic-type Dos attack, and the principle is simple. A common scenario is to use a large number of UDP packets to impact a DNS server or RADIUS authentication server, streaming media video server. The Udpflood of 100k pps often paralyzes the backbone devices on the line, such as firewalls, resulting in paralysis of the entire network segment. Because the UDP protocol is a connectionless service, in a udpflood attack, an attacker can send a large number of small UDP packets that falsify the source IP address. However, because the UDP protocol is connectionless, it is possible to attack a related service if a UDP port is available to provide related services.
Under normal application, the UDP packet two-way traffic will be basically equal, and the size and content are random, changes very much. In the case of Udpflood, UDP packets for the same destination IP appear massively on one side, and both content and size are fixed.
Icmpflood can disable the target host by sending more than 65535 bytes of packets to its destination, which is a flood attack if sent in large quantities.





Scapy is a powerful interactive packet handler (written using Python). It can forge or decode a large number of network protocol packets, can send, capture, match requests and reply packets and so on. Here we use Scapy to forge the data header content;

Remove the gnuplot error;

Define Destination IP

Defines the TCP header content;

Modify target port to port 22

Two header is set up, send Baotou, first IP after TCP, back package content as follows;

Just keep on going, and when it's enough, it's ... or grab a bag and look at it.

The third package is because we send it using scapy, which is just sending the package to the target.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.