Monday, 16 May 2016

DDOS Explained Fully

DDoS is short for Distributed Denial oService.
DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.

How DDoS Attacks Work

According to this report on eSecurityPlanet, in a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.

The Difference Between DoS and DDos Attacks

A Denial of Service (DoS) attack is different from a DDoS attack. The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource. The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed via botnets.

Types of DDoS Attacks

There are many types of DDoS attacks. Common attacks include the following:
  • Traffic attacks: Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the target. Legitimate requests get lost and these attacks may be accompanied by malware exploitation.
  • Bandwidth attacks: This DDos attack overloads the target with massive amounts of junk data. This results in a loss of network bandwidth and equipment resources and can lead to a complete denial of service.
  • Application attacks: Application-layer data messages can deplete resources in the application layer, leaving the target's system services unavailable.

Related Posts:

  • How to Hack CCTV And Webcam With Google Only Copy And Paste That Keyword On Google Search Box:- inurl:”CgiStart?page=” inurl:/view.shtml intitle:”Live View/ — AXIS” inurl:iview/view.shtml inurl:ViewerFrame?M0de= inurl:ViewerFrame?M0de=Refresh inurliaxis-cgi/jpg … Read More
  • How to Hack The Non-Vulnerable Sites 2016 Lets start No DDoS. If your target website is not vulnerable, but you really want to hack it, you could do a IP lookup on this website: <!-- m --><a class="postlink" href="http://www.yougetsignal.com/tools/web-si..… Read More
  • DDOS Explained Fully DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single … Read More
  • Use Google to Find Facebook And Other Backups Password 2016In order for these to work, all you have to do is simply copy and paste the dork into Google and search it Method 1: Facebook! We will be using a Google dork to find usernames and passwords of many accounts including Facebook… Read More
  • Manual SQL Injection Explained Fully May 2016 Many guys said that they can’t understand SQLI method as its a bit hard.and its really very hard to understand without knowing the knowledge of SQL and its very hard to inject malacious code into url and get a web site data … Read More