Skip to main content

Posts

Showing posts with the label Router Connections

Do You Know How is ICMP used in DDoS attacks?

As we have already seen that What ICMP is with our previous bug, if you still do not read at just click on ICMP . How is ICMP used in DDoS attacks? ICMP flood attack A ping flood or ICMP flood is when the attacker attempts to overwhelm a targeted device with ICMP echo-request packets. The target has to process and respond to each packet, consuming its computing resources until legitimate users cannot receive service. Ping of death attack A ping of death attack is when the attacker sends a ping larger than the maximum allowable size for a packet to a targeted machine, causing the machine to freeze or crash. The packet gets fragmented on the way to its target, but when the target reassembles the packet into its original maximum-exceeding size, the size of the packet causes a buffer overflow. The ping of death attack is largely historical at this point. However, older networking equipment could still be susceptible to it. Smurf attack In a Smurf attack, the attac...

Do You Know What is the Internet Control Message Protocol (ICMP)?

What is the Internet Control Message Protocol (ICMP)? The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. Commonly, the ICMP protocol is used on network devices, such as routers. ICMP is crucial for error reporting and testing, but it can also be used in distributed denial-of-service (DDoS) attacks. What is ICMP used for? The primary purpose of ICMP is for error reporting. When two devices connect over the Internet, the ICMP generates errors to share with the sending device in the event that any of the data did not get to its intended destination. For example, if a packet of data is too large for a router, the router will drop the packet and send an ICMP message back to the original source for the data. A secondary use of ICMP protocol is to perform network diagnostics; the...

Difference between 4G and 5G Network

4G 4 G is a mobile phone network technology, and like its predecessor 3G, it can be used for downloading data and accessing internet, but the difference is that it’s a lot faster than 3G. 5G 5G is the fifth generation of wireless network technology.It is built on what’s called millimeter waves, a section of very high frequency spectrum upwards of 20 GHz all the way up to 96 GHz. 4G Network - 5G Network All about 4G technology 4G stands for Fourth Generation technology The maximum upload rate of 4G technology is 500 Mbps The maximum download rate of 4G technology is 1 Gbps The latency of 4G technology is about 50 ms 4G offers   CDMA 4G can’t differentiate between fixed and mobile devices 4G has the advantages of high speed handoffs, global mobility 4G can be used for high speed applications, mobile TV, wearable devices It is slow and less efficient in comparison of 5G All about 5G technology 5G stands for Fifth Generation technology It provides maximum upload ...

What is ACL? - Access-Lists

Access control list (ACL) is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects or you can say for each rule we have two conditions and that is Permit or Deny. Access List Access-list (ACL) is a set of rules defined for controlling the network traffic and reducing network attack. ACLs are used to filter traffic based on the set of rules defined for the incoming or out going of the network. Types of ACL: Standard Access List: Extended Access List: Standard Access List- These are the Access-list which are made using the source IP address only. These ACLs permit or deny the entire protocol suite. They don’t distinguish between the IP traffic such as TCP, UDP, Https etc. By using numbers 1-99 or 1300-1999, router will understand it as a standard ACL and the specified address as source IP address. Extended Access List- These are the ACL which uses b...