denial of service attack
TRANSCRIPT
DoS (Denial of Service) Attack
Presented by: Y.VISHNU VARDHAN G.JAYA CHANDRA
II/IV BTECH I.T & C.S.E
Contents
● Introduction● DoS (Denial of Service)● Tools Required● Methodology● Process Explained● Pros & Cons
Introduction
DoS (Denial of Service)
DoS (Denial of Service) contd.,
● Data will not be transmitted to the users from the server
● Service will be denied due to the attack● Attack creates clogging of data packets by
creating heavy ip traffic
Tools Required
● A Linux Machine● Mono, an open source implementation of
.NET Framework● Mono-gmcs, a C# compiler● Loic.sh, a shell script which creates a flood
of packets
MethodologyA. Linux Machine
B. Mono
C. Mono-gmcs
D. LOIC
Methodology (contd.,)
(Contd…)
● Now, we are going to perform the attack on the most renouned social networking site i.e., Facebook.
● For this, we have to specify the URL in the input column allocated for it.
● And then we set the mode to UDP because it helps us to flood packets without the requirement of an acknowledgement.
Process Explained
● The packets were appended with random characters and are streamed into the subnet of the server.
● As a result, a very heavy ip traffic is created in the subnet and blocks all the packets that are being sent by the server.
● If the server uses TCP broadcast, the hop packets create more traffic and help the attacker.
Pros & Cons
● Although, the attack can't target a specific victim, it damages the server and its reputation to a greater level.
● The attacker can't be traced back because, the attacker will not receive any packet from the server and also he uses a forged ip address while streaming the packets.
● Heavy loss incurrence when performed on transaction processes.
Thank You