There are plenty of different ways to track the original source
of a DoS attack, but those techniques are not efficient enough to track
a reflected ICMP attack. When I say “reflected ICMP attack,” that means
a SMURF attack. Here I am going to show you a new model to trackback
the reflective DOS attack caused by ICMP packets.This is a very
efficient method, because you can do this with the help of a really few
attack packets. We have seen that, to detect ICMP attacks in direct attack, we need a large amount of packets to be revised, which is not true in this case.
Everything about threat intelligence, blue team, red team, pentesting, security audit, security review, testing and assessment.
Showing posts with label ddos. Show all posts
Showing posts with label ddos. Show all posts
Saturday, March 22, 2014
Sunday, June 2, 2013
Bittorrent Based DDOS Attack
BitTorrent is the most famous and widely used peer to peer file transfer protocol. Created in 2001 by Bran Cohen, it quickly caught users’ attention all over the world and it became more popular than other existing such networks like Napster, Gnutella and FastTrack. But its popularity combined with a basic flaw in the design and working of this protocol has opened the possibility for a Distributed Denial of service attack on arbitrary server of the attacker’s choice. Here we are going to look how this is possible.
Subscribe to:
Posts (Atom)

