Skip to main content

Dos&DDos Attacks - Zombie - Botnets

Hi all, today i am going to write about Dos & DDos Attacks. Cyber security is based on three components. These are Confidentiality, Integrity and Accessibility(CIA). This type of attack is in the class of accessibility component. The level of danger of Dos&DDos attacks is lower than the other attack types because there is no possibility of an attacker to infiltrate the system in this attack type.  
There are some things that need to be known before they go to Dos & DDos attacks.

  • If the incoming DDos attack is bigger than the bandwidth you have, there is nothing you can do. If you want to protect yourself in this case, you need to get support from your ISP.
  • The majority of Dos & DDos attacks are not bandwidth attacks.
  • You can not always out of service the victim. Sometimes you just slow it down.

Dos Attacks(Denial of Service)
Dos attacks are the type of attack to make systems unserviceable. Attackers perform Dos attacks using one or more computers. It is possible to perform Dos attacks on internet, local network and wireless networks. Blocking is easy because of the few attack resources, and blocking of attacking IP addresses often succeeds in stopping the attack. 
If IP Spoofing is enabled during the attack, the attack will appear to come from spoofed IP addresses. Depending on the number of spoofed IP addresses, it will not be possible to block the attack by blocking the source IP addresses.

DDOS Attacks(Distributed Denial of Service)
DDos attacks are similar to Dos attacks. But this time the attacker is attacking through hundreds or thousands of zombie computers. Zombie computers are computers that are under the control of an attacker, but who are unaware of it. In this type of attack, attackers successfully hide themselves because of using zombie computers. 

DDos Attacks
Components of DDos : 

Malware Harmful software that will turn victims into zombies.
Zombi / Botnet : Computers that will attack the target
Commend & Control Center : Where everything is managed

Why do attackers use Botnet Networks ? Is it the sole purpose of making the target out of service?
Actually not. Attackers do not always aim to make the target unserviceable. For example, if you click on ads on your webpage with zombie computer on your botnet network, you can earn a high amount of revenue. Moreover, all this operation will be completely realistic because it is only clicked once on different computers located in different parts of the world.
As a second example, we can give Online Surveys. If the option you voted on is behind the survey results, you can let the zombie computers on your Botnet Network vote for the option you want. It should not be forgotten that this applies only to surveys for which Captcha Security measures have not been taken.
Where do the attackers manage Botnet Networks ? Where are the Command & Control Centers located?
Botnet Networks were managed through IRC chat rooms until 2005. However,  IRC chat rooms are not used for Botnet C&C since access to IRC chat rooms is blocked by many companies. Today, Botnet C&C are located on HTTP, HTTPS and P2P. 
The most popular Botnet C&C is Twitter. Zombie computers that constantly check the tweets of a twitter account that attackers have already set up will recognize it when a new twit is shared and start attacking the Web Site or IP address in the twit.
Twitter Command & Control
TCP Flood Attacks
A TCP flood attack is a DDoS attack that tries to fill the processing capacity of packets of the target system by sending a large number of TCP packets to the target system. IP Spoofing can be used in this type of attack.
Most Common TCP Flood Types : SYN Flood, ACK Flood, FIN Flood.
Reminder: TCP connections first make The 3-Way Handshake. TCP sessions always start with the TCP SYN packet. 
3-Way Handshake
The most effective TCP flood attacks are SYN Food Attacks. Because operating systems are starting to allocate system resources with the first incoming SYN package before the 3-Way Handshake is complete. If no change is made, the system resource release time is 120 seconds. Let's do a little calculation to see the power of SYN Flood attacks. The size of one SYN package is 65 bytes. With 25 Mbps bandwidth, it is possible to produce an average of 50,000 packets per second. It is possible to generate an average total of 6 million packages within 120 seconds until the system resource allocated by the first package you send is released ! 
We can perform TCP flood attacks in Linux with Hping3 tool. In the next article, I will make tutorial how to make SYN Flood, ACK Flood, FIN Flood and IP Spoofing with Hping3 tool.

Comments

Popular posts from this blog

TCP Flood & IP Spoofing Tutorial - Hping3 (With Effective Tricks)

hping is a command-line oriented TCP/IP packet assembler/analyzer. Using hping3 you are able to perform at least the following stuff: Test firewall rules Testing Network performance using different protocols, packet size, TOS (type of service) and fragmentation Remote OS fingerprinting. TCP/IP stack auditing Today, we will use hping3 for testing network performance. In other words we will use it to do DDOS Attack Tests. We can start “Help Document” by typing “hping3 --help” on the command line. Hping3 Important Parameters :  The flood parameter : Activates the fastest packet sending mode The destport(p) parameter : Specifies the destination port The spoof(a) parameter : Specifies which IP Adress is to be spoofed The rand-source parameter : Activates the random source address mode Although the above parameters are important, it should be selected which flag is set to determine the main attack type.  Main Attack Types :  The syn(S) parameter: Specifies tha

How To Gain Access MsSQL using Metasploit

Nowadays companies runs more SQL Server databases inhouse than any other database platform, according to Embarcadero Technologies’ Database Survey Report, 83 percent of respondents are running SQL Server in their database environment. Database administrators use simple passwords to facilitate their access to databases. In these two cases, many companies are endangered.   DB Usage of World You can gain access the server systems of many enterprise companies using only the Metasploit Framework and a simple password list. Today I will show you how to get MSSQL passwords and what you can do with this valuable information. We use the “MsSQL Login Module” to detect MsSQL passwords. You can use the following command to select the module. Syntax example: use auxiliary/scanner/mssql/mssql_login We can list the parameters with “options” command. MsSQL Login Module Options All required parameters must be set before the “Mssql Login Module” i

Blind SQL injection on DVWA | security level = HIGH & IMPOSSIBLE !!

hey there, In this video you gonna to watch how i did blind sql injection on DVWA platform when security level was high and i'm also successful in impossible level. That was so easy. I used SQLmap ( http://sqlmap.org ) tool to perform this attack. Impossible level was also so easy but tricky. Watch this video carefully and hope you will also able to do it. For more video please subscribe my  Channel