Have you ever encountered a DDOS attack? Introduce several ways of attacking

  

There are many ways for hackers to attack. I don't know what kind of attack methods everyone has encountered, but the most common one is the DDOS attack. There are many ways to attack this, so everyone should pay attention to it. There are 7 attack methods in total. Here's how to sort it out:

1.Synflood: The attack sends a SYN packet to the destination host with multiple random source host addresses, and does not respond after receiving the SYN ACK of the destination host. The destination host establishes a large number of connection queues for these source hosts, and maintains these queues because no ACK is received, resulting in a large consumption of resources and failure to provide services to normal requests.

2.Smurf: This attack sends a packet with a specific request (such as an ICMP echo request) to the broadcast address of a subnet, and disguise the source address as the host address to be attacked. All hosts on the subnet respond to the broadcast packet request and send a packet to the attacked host, causing the host to be attacked.

3. Land-based: The attacker sets the source address and destination address of a packet to the address of the target host, and then sends the packet to the attacked host through IP spoofing. The attacked host is in an infinite loop by trying to establish a connection with itself, which greatly reduces system performance.

4.Ping of Death: According to the TCP/IP specification, the maximum length of a packet is 65536 bytes. Although the length of a packet cannot exceed 65,536 bytes, the superposition of multiple fragments divided into one packet can be done. When a host receives a packet with a length greater than 65536 bytes, it is attacked by the Ping of Death, which causes the host to crash.

5.Teardrop: When IP packets are transmitted over the network, packets can be divided into smaller segments. An attacker can implement a TearDrop attack by sending two (or more) packets. The offset of the first packet is 0, the length is N, and the offset of the second packet is less than N. In order to merge these data segments, the TCP/IP stack allocates an extraordinary amount of resources, resulting in a lack of system resources or even a machine restart.

6.PingSweep: Polling multiple hosts using ICMP Echo.

7.Pingflood: This attack sends a large number of ping packets to the destination host in a short period of time, causing network congestion or host resource exhaustion.

A DDOS attack did not expect so many aspects, when you guard against it, it is best to know what the point of each attack is, and then prescribe the right medicine, you must not give the hacker a chance, I hope to help everyone.

Copyright © Windows knowledge All Rights Reserved