Follow us on Twitter!
Never in the field of human conflict was so much owed by so many to so few. - Winston Churchill
Wednesday, April 23, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 16
Guests Online: 14
Members Online: 2

Registered Members: 82886
Newest Member: The Slummy
Latest Articles

DoS Attacks

Arrow Image Lists & explains the various DoS attacks



Denial of Service Attacks

I decided to write this because it's the most common used attack methods and people don't really seem to know what they are and how they're performed.

So I'll just list the well-known ones right here:


- DDoS

Distributed Denial of Service. Simply make a lot of computers send heaps of data to flood a server.


- IGMP Attack

Based on an error in the Internet Group Management Protocol which is used by routers to decide whether or not users are allowed on a certain subnet.
The protocol usually sends out multicasting packets which aren't all that big. With an IGMP attack you send much bigger packets so that the protocol can't handle them.
Consequence? Blue screen of death and a terminated network connection.


- SYN Flooding

Uses the Three Way Handshake by constantly connecting with the server without disconnecting.
There's no stopping this one.


- Finger attack

Only to be used in a unix network. Costs the server a lot of HDD space, memory and bandwith which makes it crash.
It's simply repeatedly calling finger:

finger @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@hostname


- Teardrop attack

When a way too large packet is sent via the Internet Protocol (IP) it splits it up into fragments. Every fragment packet has an offset to the beginning of another packet so that they can be put together again by the next system it will reach.
With the teardrop attack, the attacker puts a confusing offset value in on of the fragments (not the first). Most of the time this causes the system to crash.


- ICMP Flood

Repeatedly sending packets to the server making it crash (best done distributed).
Make a batch file with the following lines:

:loop
ping [hostname] -f
goto loop

Change [hostname] ;)


- Smurf attack

Same as ping of death, but with a spoofed return address.


- Fraggle attack:

Same as Smurf attack, but without using another victim to spoof the return address.


- trin00

http://staff.washington.edu/dittrich/misc/trinoo.analysis has to do with solaris.



Now, as you can see DoS attacks don't have to be stupid/dumb (skiddies perform them a lot though). I personally think the Teardrop attack is quite original. :-)

HvT

Comments

HvTon August 05 2005 - 18:14:02
Nice, I did something similar a while back. Smile
HvTon August 06 2005 - 18:48:32
Vote people, I need only one more! Smile
Zietlebenon August 09 2005 - 04:43:40
okay i will vote i liked it im gunnna make one in vb and how long do u think on average it would take to crash a regular home computer and im thinking about doin this at my school using all the school computers to take down a local bitches computer lol god i love being gray!B)
HvTon August 09 2005 - 16:12:33
Ok, then vote Wink It depends on their connection/pc/amount of attacking pc's. Won't take long if you use all the school pc's.
n3w7yp3on August 25 2005 - 23:38:44
HvT, what you called the Ping of Death is more accuratly referred to as an ICMP flood. The ping of death was an attack that would send a packet greater than 65536 bytes to a host. this would cause it to go belly up. it has been patched for quite a long time.
HvTon August 28 2005 - 16:51:53
My mistake, thanks! Smile
Post Comment

Sorry.

You must have completed the challenge Basic 1 and have 100 points or more, to be able to post.