Module 10: Denial-of-Service

 

Module 10: Denial-of-Service

Scenario

Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks have become a major threat to computer networks. These attacks attempt to make a machine or network resource unavailable to its authorized users. Usually, DoS and DDoS attacks exploit vulnerabilities in the implementation of TCP/IP model protocol or bugs in a specific OS.

In a DoS attack, attackers flood a victim’s system with nonlegitimate service requests or traffic to overload its resources, bringing the system down and leading to the unavailability of the victim’s website—or at least significantly slowing the victim’s system or network performance. The goal of a DoS attack is not to gain unauthorized access to a system or corrupt data, but to keep legitimate users from using the system.

Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.

In general, DoS attacks target network bandwidth or connectivity. Bandwidth attacks overflow the network with a high volume of traffic using existing network resources, thus depriving legitimate users of these resources. Connectivity attacks overflow a computer with a flood of connection requests, consuming all available OS resources, so that the computer cannot process legitimate users’ requests.

As an expert ethical hacker or penetration tester (hereafter, pen tester), you must possess sound knowledge of DoS and DDoS attacks to detect and neutralize attack handlers, and mitigate such attacks.

The labs in this module give hands-on experience in auditing a network against DoS and DDoS attacks.

Objectives

The objective of the lab is to perform DoS attack and other tasks that include, but is not limited to:

  • Perform a DoS attack by continuously sending a large number of SYN packets
  • Perform a DoS attack (SYN Flooding, Ping of Death (PoD), and UDP application layer flood) on a target host
  • Perform a DDoS attack
  • Detect and analyze DoS attack traffic
  • Detect and protect against a DDoS attack

Overview of Denial of Service

A DoS attack is a type of security break that does not generally result in the theft of information. However, these attacks can harm the target in terms of time and resources. Further, failure to protect against such attacks might mean the loss of a service such as email. In a worst-case scenario, a DoS attack can mean the accidental destruction of the files and programs of millions of people who happen to be surfing the Web at the time of the attack.

Some examples of types of DoS attacks:

  • Flooding the victim’s system with more traffic than it can handle
  • Flooding a service (such as an internet relay chat (IRC)) with more events than it can handle
  • Crashing a transmission control protocol (TCP)/internet protocol (IP) stack by sending corrupt packets
  • Crashing a service by interacting with it in an unexpected way
  • Hanging a system by causing it to go into an infinite loop

Lab Tasks

Ethical hackers or pen testers use numerous tools and techniques to perform DoS and DDoS attacks on the target network. Recommended labs that will assist you in learning various DoS attack techniques include:

  1. Perform DoS and DDoS attacks using various Techniques

    • Perform a DoS attack (SYN flooding) on a target host using Metasploit
    • Perform a DoS attack on a target host using hping3
    • Perform a DDoS attack using HOIC
    • Perform a DDoS attack using LOIC
  2. Detect and protect against DoS and DDoS attacks

    • Detect and protect against DDoS attacks using Anti DDoS Guardian

Comments

Popular posts from this blog

Lab 1: Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools

Lab 5: Perform Cryptanalysis using Various Cryptanalysis Tools

Task 2: Perform OS Discovery using Nmap Script Engine (NSE)