Denial of Service
Accomplish nothing more than taking down a system or simply denying access to it by authorized users
Distributed denial-of-service (DDoS)
not from one system but many, usually part of a botnet (network of zombie computers)
Distributed reflection denial-of-service (DRDoS)
another way of saying botnet, also known as spoof attack
uses multiple intermediary machines to pull of the denial of service
having secondary machines send the attack lets the attacker remain hidden because the attack appears to come from those secondary machines
Categories
Fragmentation attacks
takes advantage of the system's ability to reconstruct fragmented packets
Volumetric attacks
Known as bandwidth attacks, consume all available bandwidth for the system or service
Application attacks
consumes the resources necessary for the application to run, effectively making it unavailable to others
TCP state-exhaustion attacks
targets load balancers, firewalls, and application servers by attempting to consume their connection state tables
SYN attack
Hacker sends thousands of SYN packets to the machine with a false source IP address
Machine tries to respond with a SYN/ACK but will fail
Eventually all the machine's resources are engaged, making it useless
SYN flood
Hacker sends thousands of SYN packets to the target but never responds to any of the return SYN/ACK packets
Since the target has to wait to receive an answer to the SYN/ACK, it will eventually run out of available connections
ICMP flood
Attacker sends ICMP Echo packets to the target with a spoofed (fake) source address
target continues to respond to an address that doesn't exist and eventually reaches a limit of packets per second sent
Smurt
Attacker sends a large number of pings to the broadcast address of the subnet, with the source IP spoofed to that of the target
Entire subnet will then start sending ping responses to the target, using up all the resources
fraggle is similar but uses UDP
Ping of death
Attacker fragments ICMP message to send to a target
Resulting ICMP packet is larger than the max size and crashes the system
This is not a valid attack with modern systems
Teardrop
Large number of garbled IP fragments with overlapping, oversized payloads are sent to the target machine
Takes advantage of weaknesses in the fragment reassembly function of the TCP/IP stack, making the system to crash or reboot
Peer to peer
clients of a peer-to-peer file-sharing hub are disconnected and directed to connect with the target system
Permanent Phlashing
DoS attack that causes permanent damage to a system
Usually damages hardware, bricking the system
Last updated