Results 1 to 4 of 4

Thread: DOS attacks

  1. #1
    Join Date
    May 2002

    Question DOS attacks

    hi! what is dos attack? from last post about service attack i came to know about it, i wonder how many types of attacks exist. anyway where do i understand that from dos attack we mean to write some commands in dos which conitnuously send data to victim computer. FOREXAMPLE ping <someip> -t. Another good example is mail bombering. but i've pinged ten times my own network, but my server handle it. THe question is how much amount of data required to crach a system through dos attack. my server is configured at windows2000. By the way for real newbies, one could save himself from such attacks by using any firewall, i prefer zonealarm pro.

  2. #2
    Join Date
    Jul 2002
    Well lets say if someone makes a bot that floods a IRC room, someone mailbombs a e-mail account intil the account is shutdown, or cells and packets are stuffed into a connection which causes traffic. Almost anything that can boot somebody away from a area online or mess up a connection within a network could be called a DoS attack if its distributed then its a dDoS.

    Maybe it would help if do a google search on dDoS and DoS attacks or open a book and learn about networks.

  3. #3
    Senior Member
    Join Date
    Apr 2002
    read this link from when grc.com got hit with a DDoS attack it should explain to you what happens when a DDoS attack happens you can also download this document its a 23 page pdf file
    By the sacred **** of the sacred psychedelic tibetan yeti ....We\'ll smoke the chinese out
    The 20th century pharoes have the slaves demanding work

  4. #4
    Jaded Network Admin nebulus200's Avatar
    Join Date
    Jun 2002
    I think you are mildy confused. DOS, in the context that you are using it, refers to a 'Denial of Service' rather than a 'Disk Operating System' (which is what DOS in the context of a DOS prompt means). There are many different kinds of Denial of Service attacks to be worried about, and a firewall will not necessarily buy you anything for some kinds. These attacks refer only to the fact that your network connection is no longer usuable, not necessarily how it is done.

    Bandwidth consumption attacks. These can either be DOS or DDOS (Distributed Denial of Service) attacks. In the case of a simple DOS, maybe for example you are connected to the internet via a 56 Kb/s (Kilobytes/Second) connection and someone is flooding your network with traffic from say a T1 (1.5 Megabytes / second or 1536 Kb/second). Obviously they would be able to send you more data than you can receive. Now, it is not always the case that someone will have massively more bandwidth available to flood your network, so they resort to a DDOS attack, which involves multiple computers/networks flooding your network with traffic, and these attacks can 'bring down' even networks with very high bandwidth if a sufficient number of zombies are used. Even if the network is not brought down, the victim network would still experience 'slowness' as some of the originally available bandwidth is no longer free but rather consumed with junk traffic. In many respects, Code Red could almost have been considered a DDoS attack because of the effect of thousands of infected computers scanning the internet trying to infect other machines.

    Service Denial. There are many subcategories, but the term in general refers to the denial of a particular service, say email. This can be the result of a massive virus infection, syn flood to a specific host/port, or one packet kills that take advantage of design errors/bugs in TCP/IP stack implementations. There are so many variations to these types of attacks that I will not go any further into them, but I do highly recommend doing a google search for 'Denial of Service' and there should be more than enough material to read that would be far more informative than anything I could slap together.

    As a final wrapup, there are times when DoS attacks are used to hack a system (for example, TCP/IP spoofing/session hijaacking), but most of the time they are considered a lamer last resort of script kiddiez that couldn't get into a network.

    There is only one constant, one universal, it is the only real truth: causality. Action. Reaction. Cause and effect...There is no escape from it, we are forever slaves to it. Our only hope, our only peace is to understand it, to understand the 'why'. 'Why' is what separates us from them, you from me. 'Why' is the only real social power, without it you are powerless.

    (Merovingian - Matrix Reloaded)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.