Search This Blog

Monday, August 12, 2019

What is DoS (Denial-of-Service) Attack & Tools to Perform DOS & DDOS Attack

DoS vs DDoS Attack

There are two general forms of DoS attacks DoS & Distributed DoS. in distributed denial of service(DDoS) attack involves more than one attack source. main difference between DoS and DDoS Attacks is that The DoS attack typically uses one computer and one Internet connection to flood a targeted network or resource. The DDoS attack uses multiple compromise computers(Zombies or Botnet) and Internet connections to flood with data packets the targeted resource.

DoS/DDoS Attack Method

DoS Attack can categorize into at least three different types.

1. Volumetric Attacks

Volumetric attacks are the most common types of DoS attack about 65% attacks are volumetric attack. Volumetric Attacks that use massive amount of traffic saturating the bandwidth of the target. Attacker simply sends a large volume of useless packets to the target thereby using up all the resources.

2. Fragmentation/Protocol Attacks

Fragmentation attacks are a common form of denial of service attack, in which the perpetrator overbears a network by exploiting datagram fragmentation mechanisms. fragmentation attack use the resources of the network equipment on the periphery of the server such a firewalls, intrusion detection systems, and switches. fragmentation attacks can take several forms. While they all exploit the breakdown of datagrams in order to overbear the target networks.

3. Application layer Attack

An application layer attack is a form of DDoS attack where attackers target the application layer of the OSI model attacker exploit a weakness in the layer 7 protocol stack. The attack over-exercises specific functions or features of a website with the intention to disable those functions or features.
DoS/DDoS Attack Tools
The following are some of the popular tools that can be used to perform DoS and DDoS attacks.
  1. Metasploit
  2. Aircrack-ng
  3. HULK (HTTP Unbearable Load King)
  4. Nemesy
  5. RUDY (R-U-Dead-Yet)
  6. LOIC (The Low Orbit Ion Cannon)
  7. HOIC
  8. XOIC
  9. Xerxes
  10. Blast
  11. GoldenEye
  12. UDP flooder
  13. PyLoris
  14. Tor’s Hammer
  15. DDOSIM – Layer 7 DDoS Simulator


Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

0 comments:

Post a Comment