Popular Post

Posted by : Unknown March 16, 2014

Denial of Service Attack (DOS) Attack On Websites


Hello readers, This is one of the most popular attack. When hacker or cracker not able to gain access on the target when he attacks the system for denial of services. 


                                 
 
What is DDos Attack?
A Denial-of-Service attack (DoS attack) or Distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DOS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

In a typical DDoS attack, a hacker (or, if you prefer, cracker) begins by exploiting a vulnerability in one computer system and making it the DDoS master. It is from the master system that the intruder identifies and communicates with other systems that can be compromised. The intruder loads cracking tools available on the Internet on multiple -- sometimes thousands of -- compromised systems. With a single command, the intruder instructs the controlled machines to launch one of many flood attacks against a specified target. The inundation of packets to the target causes a denial of service.


How DoS Attacks are executed ? 
DoS Attacks are usually executed by flooding the target servers with unsolicited data packets in unprecedented manner. This may be done by misconfiguring network routers or by performing smurf attack on the victim servers. This results in ‘Capacity Overflow’, followed by Max Out of system resources, which makes the target service unavailable, either temporarily or permanently(In case of hardware targeted DoS attack) to the intended users.
 
DOS Attack Methods

Denial of Service (DOS) attacks are intended to shut down the servers for a period of time. To make site nonfunctional for a time the main part of attack is DOS attack. DOS attacks are usually doing by following methods:
1. Send unlimited amount of packets to the server.  
2. Executing Malwares   
3. Teardrop attack   
4. Application level flood
 
 
How to Perform Attack:  
 * Sending unlimited packets by ping command is also known as ICMP flood. This method can be done in the following way.
 Follow these steps:   
1: First of all you need to know the IP address of the website you want to crash. Use ping command in windows to get the ip address of the website
 open CMD and enter ping www.website.com  And you will get target machine IP. 

2: Use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open  choose another website to attack.
3: Now  You have target machine IP Address. Type following command in CMD
      A simple DOS attack code would be:
      
      ping {Victim IP} -t -l 20000
On command prompt window you can type the following command. This command sends 20000 bytes of data to the IP, in a single packet. The -t is to ping the specified host until stopped and -l is to specify the buffer size.
 DOS attack with ping flood will work only if the following cafeterias are satisfied:
 1. Attacker should have higher bandwidth than the victim.
 2. Victim should respond to the ping requests

Leave a Reply

Subscribe to Posts | Subscribe to Comments

Top | Home | About | Write For Us | Contact | Privacy Policy | Term Of Use | Sitemap
Copyright © 2014 kuch.in All Rights Reserved. Designed by Ashacks Team