Types of DoS Attacks
The main types of DoS attacks are as follows:
Ø Ping of
death: Sending a malformed or otherwise malicious ping to a computer
Ø Teardrop:
Forging fragmented packets designed to overlap each other when the receiving
hosts defragment them
Ø SYN
flooding: Sending TCP connection requests to a target host faster than it can
process them
Ø LAND:
Sending a data packet to a targeted machine with the same host and port names
for the source and the destination
Ø Smurf:
Using spoofed IP addresses to send broadcast ping messages to a large number of
hosts in a network to flood the system
Ø Fraggle:
Using UDP packets to flood a network
Ø Snork:
Targeted against Windows NT RPC services
Ø OOB
attack: Exploiting a bug in Microsoft’s implementation of its IP stack
Ø Buffer
overflow attack: Sending more information to a program than it is allocated to
handle
Ø Nuke
attack: Repeatedly sending fragmented or invalid ICMP packets to the target
computer
Ø Reflected
attack: Sending false requests to a large number of computers, which respond to
those requests.
Hi Sankara, I have a question, Repeatedly visiting same site from same IP will have any load on server? will it trigger DOS attack by any chance.
ReplyDeleteHi Lokesh,
ReplyDeleteIf you visit any site that will be load on server, but DOS is different. Read this
http://sankar-information-security.blogspot.com/2012/10/ping-of-deathdos-attack-this.html
Now you get the idea.