DoS & D-Dos

Exploitbytes
2 min readNov 21, 2019

--

DOS

Denial of service (DOS) is an attack on a computer or network that reduces, restricts or prevent accessibility of system resources to its legitimate users.

In a DOS attack, attackers flood a victim system with non-legitimate service request or traffic to overload its resources.

Dos attack leads to unavailability of a particular website and slow network performance.

Denial of Service (DOS) is a type of attack in which service offered by a system or a network is denied. Services may either be denied, reduced the functionality or prevent the access to the resources even to the legitimate users.

There are several techniques to perform Dos attack such generating a large number of request to the target system for service. These large number of incoming request overload the systme capacity to entertain resulting denial of service

You also Look For Network security Zoning

Loss Of DOS Attack are;-

Also Read: How to hack wifi using kali linux

What Is D-Dos Attack?

A Distributed Denial of service (DDOS) attack involves a multitude of compromised systems attacking a single target, thereby causing denial of service for users of the targeted systems.

To launch a DDos attack, an attacker uses botnets and attack a single system.

How D-Dos Work

Normally an establishment of a connection consists of some step in which a user sends a request to a server to authenticate it. The server return with the authentication approval. Requesting user knowledges this approval, and then the connection is established and is allowed onto the server.

In the process of Denial of service attack, the attacker sends several authentication request to the server. These request have fake return addresses, so the server can;t find a user to send the authentication approval. This authentication process waits for a certain time to close the session. The server typically waits more than a minute, before closing the session. The attacker is continuously sending request causing a number of open connections on the server resulting in the denial of service.

Originally published at https://exploitbyte.com on November 21, 2019.

--

--

Exploitbytes
Exploitbytes

Written by Exploitbytes

I am Ethical Hacker & Bug Hunter.

No responses yet