Skip to main content

Posts

Showing posts with the label DDOS

Do You Know common network vulnerabilities?

In actual Networks suffer and the reason is hardware failure, administrator error, bugs in purchased or internally written software, and power and heating problems, but security has become a primary concern. Hacking is now a high-income profession, with hackers gaining access to valuable information, like social insurance numbers and confidential corporate or government information. Here we list down some common network vulnerabilities enterprise network teams should actively monitor for and methods they'll use to stop attacks. Phishing The term malware covers multiple forms of attack. Phishing and spear phishing are now common methods wont to capture login IDs and passwords. as an example, in phishing attacks, users open what appears to be a legitimate email, but the malware inserts code that seemingly causes the user accounts to exit. When the users log back in, the malware captures their keystrokes. Spear phishing is especially dangerous, because the attack typically focuses on ...

Do You Know How is ICMP used in DDoS attacks?

As we have already seen that What ICMP is with our previous bug, if you still do not read at just click on ICMP . How is ICMP used in DDoS attacks? ICMP flood attack A ping flood or ICMP flood is when the attacker attempts to overwhelm a targeted device with ICMP echo-request packets. The target has to process and respond to each packet, consuming its computing resources until legitimate users cannot receive service. Ping of death attack A ping of death attack is when the attacker sends a ping larger than the maximum allowable size for a packet to a targeted machine, causing the machine to freeze or crash. The packet gets fragmented on the way to its target, but when the target reassembles the packet into its original maximum-exceeding size, the size of the packet causes a buffer overflow. The ping of death attack is largely historical at this point. However, older networking equipment could still be susceptible to it. Smurf attack In a Smurf attack, the attac...

Do You Know What is the Internet Control Message Protocol (ICMP)?

What is the Internet Control Message Protocol (ICMP)? The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. Commonly, the ICMP protocol is used on network devices, such as routers. ICMP is crucial for error reporting and testing, but it can also be used in distributed denial-of-service (DDoS) attacks. What is ICMP used for? The primary purpose of ICMP is for error reporting. When two devices connect over the Internet, the ICMP generates errors to share with the sending device in the event that any of the data did not get to its intended destination. For example, if a packet of data is too large for a router, the router will drop the packet and send an ICMP message back to the original source for the data. A secondary use of ICMP protocol is to perform network diagnostics; the...