Sunday, 19 August 2018

What is DoS Attack & How to perform DoS Attack

August 19, 2018 0 Comments

What is DoS Attack?
What is DoS Attack & How to perform DoS Attack
HI! how are you friends . today my topic about all information DOS and DDOS attack so let started.
A denial of Service attack up all the system resource that unavailable to it intended
Users. The temporarily or indeterminately troublesome services of a host connected to the Internet so that others can’t connect. DoS atack hitting the target server, network resources or service with too many requests at the same time for this reason server deny to respond to all the requests. The effect of this can either be crashing the servers or extremely slowing them down. DoS’s intent is to deny legitimate users access to a resource such as a website, network, server, WiFi etc.

DoS vs DDoS Attack

There are two form of DOS attacks one is DOS and another on is DDOS.
The meaning of DOS(denial of service) and meaning of DDOS(distributed denial of service . main difference between DoS and DDOS . The DDos involves more than one attacks source. Another difference Dos and DDOS is that attacks .the Dos attack work on system or computer or on internet connection to flood a target network or resource. The DDOS attack uses multiple compromise computer and internet connection to flood with data packets the targeted resource.
DoS/DDoS Attack Method

DoS/DDoS Attack Method

DoS Attack can categorize into at least three different types.

1. Volumetric Attacks

Volumetric attacks are the most common types of DoS attack about 65% attacks are volumetric attack. Volumetric Attacks that use massive amount of traffic saturating the bandwidth of the target. Attacker simply sends a large volume of useless packets to the target thereby using up all the resources.

2. Fragmentation/Protocol Attacks

Fragmentation attacks are a common form of denial of service attack, in which the perpetrator overbears a network by exploiting datagram fragmentation mechanisms. fragmentation attack use the resources of the network equipment on the periphery of the server such a firewalls, intrusion detection systems, and switches. fragmentation attacks can take several forms. While they all exploit the breakdown of datagrams in order to overbear the target networks.

3. Application layer Attack

An application layer attack is a form of DDoS attack where attackers target the application layer of the OSI model attacker exploit a weakness in the layer 7 protocol stack. The attack over-exercises specific functions or features of a website with the intention to disable those functions or features.

DoS/DDoS Attack Tools

The following are some of the popular tools that can be used to perform DoS and DDoS attacks.
  1. Metasploit
  2. Aircrack-ng
  3. HULK (HTTP Unbearable Load King)
  4. Nemesy
  5. RUDY (R-U-Dead-Yet)
  6. LOIC (The Low Orbit Ion Cannon)
  7. HOIC
  8. XOIC
  9. Xerxes
  10. Blast
  11. GoldenEye
  12. UDP flooder
  13. PyLoris
  14. Tor’s Hammer
  15. DDOSIM – Layer 7 DDoS Simulator