Welcome to my site. Please CLICK HERE to give your opinions regarding this new look of "PCTipsbyAnu". Thanks for visiting.

Friday, December 31, 2010

Browse » Home » , , , , , » Hacking tools : Type of hacking? What is DDOS? Tools for DDOS?

Hacking tools : Type of hacking? What is DDOS? Tools for DDOS?

Adenial of service (DoS) attack is an attack that clogs up so muchmemory on the target system that it can not serve it’s users, or itcauses the target system to crash, reboot, or otherwise deny servicesto legitimate users.

There are several different kinds of dos attacks asdiscussed below:-

1) Ping Of Death :-The ping of death attack sends oversized ICMP datagrams (encapsulatedin IP packets) to the victim.The Ping command makes use of the ICMPecho request and echo reply messages and it’s commonly used todetermine whether the remote host is alive. In a ping of death attack,however, ping causes the remote system to hang, reboot or crash. To doso the attacker uses, the ping command in conjuction with -l argument(used to specify the size of the packet sent) to ping the target systemthat exceeds the maximum bytes allowed by TCP/IP (65,536).

example:- c:/ping -l 65540 hostname

Fortunately, nearly all operating systems these days are not vulnerable to the ping of death attack.

2) Teardrop Attack :- Whenever data is sent over the internet, it is broken into fragments atthe source system and reassembled at the destination system. 
Forexample you need to send 3,000 bytes of data from one system toanother. Rather than sending the entire chunk in asingle packet, thedata is broken down into smaller packets as given below:

* packet 1 will carry bytes 1-1000.
* packet 2 will carry bytes 1001-2000.
* packet 3 will carry bytes 2001-3000.

In teardrop attack, however, the data packets sent to the target computer contais bytes that overlaps with each other.
(bytes 1-1500) (bytes 1001-2000) (bytes 1500-2500)

When the target system receives such a series of packets, it can notreassemble the data and therefore will crash, hang, or reboot.
Old Linux systems, Windows NT/95 are vulnerable.

3) SYN – Flood Attack :-In SYN flooding attack, several SYN packets are sent to the targethost, all with an invalid source IP address. When the target systemreceives these SYN packets, it tries to respond to each one with aSYN/ACK packet but as all the source IP addresses are invalid thetarget system goes into wait state for ACK message to receive fromsource. Eventually, due to large number of connection requests, thetarget systems’ memory is consumed. In order to actually affect thetarget system, a large number of SYN packets with invalid IP addressesmust be sent.

4) Land Attack :-A land attack is similar to SYN attack, the only difference being thatinstead of including an invalid IP address, the SYN packet include theIP address of the target sysetm itself. As a result an infinite loop iscreated within the target system, which ultimately hangs andcrashes.Windows NT before Service Pack 4 are vulnerable to this attack.

5) Smurf Attack :-There are 3 players in the smurf attack–the attacker,the intermediary(which can also be a victim) and the victim. In most scenarios theattacker spoofs the IP source address as the IP of the intended victimto the intermediary network broadcast address. Every host on theintermediary network replies, flooding the victim and the intermediarynetwork with network traffic.
Smurf Attack

Result:-Performance may be degraded such that the victim, the victim andintermediary networks become congested and unusable, i.e. clogging thenetwork and preventing legitimate users from obtaining network services.

6) UDP – Flood Attack :-Two UDP services: echo (which echos back any character received) andchargen (which generates character) were used in the past for networktesting and are enabled by default on most systems. These services canbe used to launch a DOS by connecting the chargen to echo ports on thesame or another machine and generating large amounts of network traffic.

7) Distributed Denial Of Service (DDoS) :- InDistributed DoS attack, there are 100 or more different attackers(systems) attacking the single system. Due to higher number ofattackers DDoS attack is more effective and dangerous than regular DoSattack. The attackers have control over master zombies, which, in turn,have control over slave zombies, as shown in figure.

ddos attack

No system connected to the internet is safe from DDoS attacks. Allplatforms, including Unix and Windows NT, are vulnerable to suchattacks. Even Mac OS machines have been used to conduct DDoS attacks.

The most popular DDoS tools are:-
a) Trin00 (WinTrinoo)
b) Tribe Flood Network (TFN) (TFN2k)
c) Shaft
d) Stacheldraht
e) MStream

 OR pctipsbyanu@gmail.com

Distributed Denial Of Service with Reflectors (DRDoS) :-In DRDoS attacks the army of the attacker consists of master zombies,slave zombies, and reflectors. The difference in this type of attack isthat slave zombies are led by master zombies to send a stream ofpackets with the victim’s IP address as the source IP address to otheruninfected machines (known as reflectors), exhorting these machines toconnect with the victim. Then the reflectors send the victim a greatervolume of traffic, as a reply to its exhortation for the opening of anew connection, because they believe that the victim was the host thatasked for it. Therefore, in DRDoS attacks, the attack is mounted bynoncompromised machines, which mount the attack without being aware ofthe action.

A DRDoS attack creates a greatervolume of traffic because of its more distributed nature, as shown inthe figure below.

drdos attack

Keep enjoy*****.....
You can leave a response, or trackback from your own site.

About 'Anu': My name is 'Anu' also Known as 'ANU 007 TIGER' .I'm administrator of 'PC Tips by Anu' blog .This blog was opened for sharing contents about hacking n cracking.


Anonymous said...

Hmm thn provide me the tools on inspiredhacker@gmail.com

Anonymous said...

Plz provide me the link on vik_hacker@yahoo.com

Anonymous said...


Co-Admin -- Code Mobile said...

Plz provide you names for full cooperation

Post a Comment

Back to Top