DDos Attack: Explained - GoTechTalk

Tracker

Tuesday, July 24, 2018

DDos Attack: Explained

This technique is apparently what allowed a hacker group to launch an attack on the scale of 400 gigabits per second recently, 50 times the largest recorded attack 10 years ago at eight gigabits per second.
By Sudarshan Yerunkar |  | 🛍 Support me with your Amazon purchases: https://amzn.to/311Gk4H | Posted on 24h jul 2018 | Updated on 3rd April 2021.


DDos Attack: Explained


Have you ever been browsing your favorite website or watching your favorite online video stream only to have your access suddenly slowed to a crawl or cut off, and I'm not talking about a frustrated parent spouse child or pet pulling the cord and then you realize that every other site is working fine


Well your initial response might be those of need to upgrade their network connection and servers which if they're experiencing higher than usual web traffic, may actually be the case but another likely scenario is that the site is being hit by a Distributed Denial of service or DDoS Attack, these nuisances come in many forms amplification attacks, nooks teardrops of Smurfs etc but most operate in pretty much the same manner by utilizing a large network of remote PCs called a botnet when grouped together to overwhelm another systems connection or processor causing it to deny service to the legitimate traffic it's receiving.


The first type of attack could be considered your standard blitzkrieg type because it attempts to directly overwhelm a system often by plugging all of its ports with garbage streams like incessant pings are endless fragmented packets without rebuilding instructions it's about the equivalent of a kid in the backseat asking are we there yet, are we there yet, leaving absolutely no dead air to actually respond to say for the last time no we're not there yet.


Next up is your prank calls attacks that cause further bandwidth and processing congestion by forcing the server to actually respond to their nonsense, this can be done in a number of ways by forcing a website to handshake endlessly with new systems or attempt to validate spam port connection requests before eventually giving out an ICMP destination error or in the case of get requests attacks triggering the sort of large-scale file transfers.



Third type of attack the deadliest is the DNS server amplification attack, this technique uses an individual PCs ability to act as its own domain name server to request the same sort of junk from the other techniques then forward it to a target amplifying the severity of the attack as much as 70 fold, this technique is apparently what allowed a hacker group to launch an attack on the scale of 400 gigabits per second recently, 50 times the largest recorded attack 10 years ago at eight gigabits per second, alright so i guess i get it, some junk runs in the background of my PC turning it into a zombie for this so-called botnet but why would anyone want to do this?? well good question and there's a wide range of motivations from hacktivist groups trying to block access to terrorist recruitment websites to gamers targeting opponents to increase their ping times for a competitive edge to folks who apparently just want to watch the world burn, but the good news is protection against these sorts of attacks is getting easier and more affordable than ever with techniques like running data through a high capacity server or using scrubbing filters that prevent huge amounts of fake traffic from causing more than just a momentary slowdown.

No comments:

Post a Comment

close