DOS: is the abbreviation for the denial of service, the denial of service, not the DOS operating system, which causes Dos attacks to be called Dos attacks, and is designed to make the computer or network unable to provide normal services. The most common Dos attacks are computer network bandwidth attacks and connectivity attacks.
DDoS: Distributed Denial-of-service (ddos:distributed denial of service) attacks refer to the use of client/server technology to unite multiple computers as an attack platform to launch DDOS attacks against one or more targets. Thus multiplying the power of denial of service attacks.
Distributed processing is a computer system that coordinates large-scale information processing tasks in a coordinated manner under the unified management control of a control system by connecting multiple computers with different locations, or with different functions, or with different data in a communication network. The
Denial of service attack does not simply send a large amount of data to make the target host not functioning properly, and we can also send several packets through a system vulnerability to enable the target host to achieve the denial of service.
Hackers find vulnerabilities, plant zombie programs, make machines Zombie,
and attack traffic and normal access traffic are not easy to distinguish. The
Udpflood is an increasingly rampant, traffic-type Dos attack, and the principle is simple. A common scenario is to use a large number of UDP packets to impact a DNS server or RADIUS authentication server, streaming media video server. The Udpflood of 100k pps often paralyzes the backbone devices on the line, such as firewalls, resulting in paralysis of the entire network segment. Because the UDP protocol is a connectionless service, in a udpflood attack, an attacker can send a large number of small UDP packets that falsify the source IP address. However, because the UDP protocol is connectionless, it is possible to attack a related service if a UDP port is available to provide related services.
Under normal application, the UDP packet two-way traffic will be basically equal, and the size and content are random, changes very much. In the case of Udpflood, UDP packets for the same destination IP appear massively on one side, and both content and size are fixed.
Icmpflood can disable the target host by sending more than 65535 bytes of packets to its destination, which is a flood attack if sent in large quantities.
Scapy is a powerful interactive packet handler (written using Python). It can forge or decode a large number of network protocol packets, can send, capture, match requests and reply packets and so on. Here we use Scapy to forge the data header content;
Remove the gnuplot error;
Define Destination IP
Defines the TCP header content;
Modify target port to port 22
Two header is set up, send Baotou, first IP after TCP, back package content as follows;
Just keep on going, and when it's enough, it's ... or grab a bag and look at it.
The third package is because we send it using scapy, which is just sending the package to the target.