Skip to main content

Dos&DDos Attacks - Zombie - Botnets

Hi all, today i am going to write about Dos & DDos Attacks. Cyber security is based on three components. These are Confidentiality, Integrity and Accessibility(CIA). This type of attack is in the class of accessibility component. The level of danger of Dos&DDos attacks is lower than the other attack types because there is no possibility of an attacker to infiltrate the system in this attack type.  
There are some things that need to be known before they go to Dos & DDos attacks.

  • If the incoming DDos attack is bigger than the bandwidth you have, there is nothing you can do. If you want to protect yourself in this case, you need to get support from your ISP.
  • The majority of Dos & DDos attacks are not bandwidth attacks.
  • You can not always out of service the victim. Sometimes you just slow it down.

Dos Attacks(Denial of Service)
Dos attacks are the type of attack to make systems unserviceable. Attackers perform Dos attacks using one or more computers. It is possible to perform Dos attacks on internet, local network and wireless networks. Blocking is easy because of the few attack resources, and blocking of attacking IP addresses often succeeds in stopping the attack. 
If IP Spoofing is enabled during the attack, the attack will appear to come from spoofed IP addresses. Depending on the number of spoofed IP addresses, it will not be possible to block the attack by blocking the source IP addresses.

DDOS Attacks(Distributed Denial of Service)
DDos attacks are similar to Dos attacks. But this time the attacker is attacking through hundreds or thousands of zombie computers. Zombie computers are computers that are under the control of an attacker, but who are unaware of it. In this type of attack, attackers successfully hide themselves because of using zombie computers. 

DDos Attacks
Components of DDos : 

Malware Harmful software that will turn victims into zombies.
Zombi / Botnet : Computers that will attack the target
Commend & Control Center : Where everything is managed

Why do attackers use Botnet Networks ? Is it the sole purpose of making the target out of service?
Actually not. Attackers do not always aim to make the target unserviceable. For example, if you click on ads on your webpage with zombie computer on your botnet network, you can earn a high amount of revenue. Moreover, all this operation will be completely realistic because it is only clicked once on different computers located in different parts of the world.
As a second example, we can give Online Surveys. If the option you voted on is behind the survey results, you can let the zombie computers on your Botnet Network vote for the option you want. It should not be forgotten that this applies only to surveys for which Captcha Security measures have not been taken.
Where do the attackers manage Botnet Networks ? Where are the Command & Control Centers located?
Botnet Networks were managed through IRC chat rooms until 2005. However,  IRC chat rooms are not used for Botnet C&C since access to IRC chat rooms is blocked by many companies. Today, Botnet C&C are located on HTTP, HTTPS and P2P. 
The most popular Botnet C&C is Twitter. Zombie computers that constantly check the tweets of a twitter account that attackers have already set up will recognize it when a new twit is shared and start attacking the Web Site or IP address in the twit.
Twitter Command & Control
TCP Flood Attacks
A TCP flood attack is a DDoS attack that tries to fill the processing capacity of packets of the target system by sending a large number of TCP packets to the target system. IP Spoofing can be used in this type of attack.
Most Common TCP Flood Types : SYN Flood, ACK Flood, FIN Flood.
Reminder: TCP connections first make The 3-Way Handshake. TCP sessions always start with the TCP SYN packet. 
3-Way Handshake
The most effective TCP flood attacks are SYN Food Attacks. Because operating systems are starting to allocate system resources with the first incoming SYN package before the 3-Way Handshake is complete. If no change is made, the system resource release time is 120 seconds. Let's do a little calculation to see the power of SYN Flood attacks. The size of one SYN package is 65 bytes. With 25 Mbps bandwidth, it is possible to produce an average of 50,000 packets per second. It is possible to generate an average total of 6 million packages within 120 seconds until the system resource allocated by the first package you send is released ! 
We can perform TCP flood attacks in Linux with Hping3 tool. In the next article, I will make tutorial how to make SYN Flood, ACK Flood, FIN Flood and IP Spoofing with Hping3 tool.

Comments

Popular posts from this blog

TCP Flood & IP Spoofing Tutorial - Hping3 (With Effective Tricks)

hping is a command-line oriented TCP/IP packet assembler/analyzer. Using hping3 you are able to perform at least the following stuff: Test firewall rules Testing Network performance using different protocols, packet size, TOS (type of service) and fragmentation Remote OS fingerprinting. TCP/IP stack auditing Today, we will use hping3 for testing network performance. In other words we will use it to do DDOS Attack Tests. We can start “Help Document” by typing “hping3 --help” on the command line. Hping3 Important Parameters :  The flood parameter : Activates the fastest packet sending mode The destport(p) parameter : Specifies the destination port The spoof(a) parameter : Specifies which IP Adress is to be spoofed The rand-source parameter : Activates the random source address mode Although the above parameters are important, it should be selected which flag is set to determine the main attack type.  Main Attack Types :  The syn(S) parameter: Specifies tha

Top 110 Free Proxy Sites – Best Free Proxy Servers List 2017

Sometimes you may face problem while accessing some websites either it says this webpage is not available or this website/url has been blocked. If you still want to access a useful website from a place where it is blocked, the best way to access a blocked website is by using a proxy websites. Proxy sites can open restricted website which are blocked in colleges, schools, government offices, IP restricted etc. Proxy sites not only help you to access blocked websites, it also help to surf internet anonymously. Proxy sites are very easy to use. They redirect your network traffic through their servers so that you can access those websites because their servers are not blocked to access that site. So here in this tutorial we are providing you the list of top 110 proxy servers. The below we listed the best proxy sites: Skull Proxy: Skull Proxy is a new yet very powerful proxy server that should take you to your desired site with a blazing loading time. Hidester: Peo

NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool

The United States' National Security Agency (NSA) today finally released GHIDRA version 9.0 for free, the agency’s home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications. GHIDRA is a Java-based reverse engineering framework that features a graphical user interface (GUI) and has been designed to run on a variety of platforms including Windows, macOS, and Linux. Reverse engineering a program or software involves disassembling, i.e. converting binary instructions into assembly code when its source code is unavailable, helping software engineers, especially malware analysts, understand the functionality of the code and actual design and implementation information. Download  GHIDRA 9.0 — software package, slides, and exercises Adapted from  thehackernews.com