Denial Of Service Attack [Episode 2]

On a previous article you have read the basic idea and basic denial of service attack and their defense, as i described on previous article that we will share a code for SYN flooding attack.
Here is an example of exploit code written by Zakath that creates a SYN flood, the code is presented here for educational purpose only, this code is available on many web sites.

 Ping of death
  • Ping of death is an another type of DOS attack that can shut down systems, and causing a great harm to the system.
  • Default ICMP echo packet size of 64 bytes, many computer system could not handle the incoming packet larger the default packet size.
  • In ping of death attack an attacker generates ICMP echo packets of over 65,535 bytes that is illegal.
  • If you ping to a host like ping 192.168.1.1   
  • What would happen if you do this thing like ping 192.168.0.1 -l 65500 -n 10000
  • This, in effect, pings the target machine 192.168.0.1 continuously [10,000 times] with 64 kBs of data.
Distributed DOS

  • Distributed denial of service attack or DDOS attack is a attack in which an attacker uses several machine to launch DOS attack that’s why it is difficult to handle.
  • In DDOS attack multiple compromised system that already infected are uses against the victim computer.
  • In this case it is difficult to track the attacker because this attack generates from several IP addresses, and it is difficult to block.


Overall Defense:


There are no any single way to prevent DOS attack because of it varying nature, there are some effective way to avoid and reduce to effect of this attack.

  • Install and maintain anti-virus software.
  • Install a firewall, and configure it to restrict traffic coming into and leaving your computer (Firewall ,Firewall 2)
  • Here is a nice article on Defense against SYN attack.






Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Previous articleEmail Spoofing
Next articleMalware [Episode 1]
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...