24
DoS (Denial of Service) Attack Presented by: Y.VISHNU VARDHAN G.JAYA CHANDRA II/IV BTECH I.T & C.S.E

Denial Of Service Attack

Embed Size (px)

Citation preview

Page 1: Denial Of Service Attack

DoS (Denial of Service) Attack

Presented by: Y.VISHNU VARDHAN G.JAYA CHANDRA

II/IV BTECH I.T & C.S.E

Page 2: Denial Of Service Attack

Contents

● Introduction● DoS (Denial of Service)● Tools Required● Methodology● Process Explained● Pros & Cons

Page 3: Denial Of Service Attack

Introduction

Page 4: Denial Of Service Attack

DoS (Denial of Service)

Page 5: Denial Of Service Attack

DoS (Denial of Service) contd.,

● Data will not be transmitted to the users from the server

● Service will be denied due to the attack● Attack creates clogging of data packets by

creating heavy ip traffic

Page 6: Denial Of Service Attack

Tools Required

● A Linux Machine● Mono, an open source implementation of

.NET Framework● Mono-gmcs, a C# compiler● Loic.sh, a shell script which creates a flood

of packets

Page 7: Denial Of Service Attack

MethodologyA. Linux Machine

Page 8: Denial Of Service Attack

B. Mono

Page 9: Denial Of Service Attack

C. Mono-gmcs

Page 10: Denial Of Service Attack

D. LOIC

Page 11: Denial Of Service Attack

Methodology (contd.,)

Page 12: Denial Of Service Attack
Page 13: Denial Of Service Attack

(Contd…)

● Now, we are going to perform the attack on the most renouned social networking site i.e., Facebook.

● For this, we have to specify the URL in the input column allocated for it.

● And then we set the mode to UDP because it helps us to flood packets without the requirement of an acknowledgement.

Page 14: Denial Of Service Attack
Page 15: Denial Of Service Attack
Page 16: Denial Of Service Attack
Page 17: Denial Of Service Attack
Page 18: Denial Of Service Attack
Page 19: Denial Of Service Attack
Page 20: Denial Of Service Attack
Page 21: Denial Of Service Attack

Process Explained

● The packets were appended with random characters and are streamed into the subnet of the server.

● As a result, a very heavy ip traffic is created in the subnet and blocks all the packets that are being sent by the server.

● If the server uses TCP broadcast, the hop packets create more traffic and help the attacker.

Page 22: Denial Of Service Attack

Pros & Cons

● Although, the attack can't target a specific victim, it damages the server and its reputation to a greater level.

● The attacker can't be traced back because, the attacker will not receive any packet from the server and also he uses a forged ip address while streaming the packets.

● Heavy loss incurrence when performed on transaction processes.

Page 23: Denial Of Service Attack
Page 24: Denial Of Service Attack

Thank You