Previous Thread
Next Thread
Print Thread
Rate Thread
#9372 06/24/03 05:30 PM
Joined: Jun 2003
Posts: 807
Likes: 2
G
UGN Super Poster
UGN Super Poster
G Offline
Joined: Jun 2003
Posts: 807
Likes: 2
What is the pupose of a denial of service attack?

Sponsored Links
▼ Sponsored Links ▼ ▲ Sponsored Links ▲
#9373 06/24/03 06:44 PM
Joined: Mar 2002
Posts: 1,041
I
UGN Elite Poster
UGN Elite Poster
I Offline
Joined: Mar 2002
Posts: 1,041
Exactly that. To deny service. It can take many forms, but the end result is people not being able to do what they wish.

#9374 06/24/03 07:26 PM
Joined: Jun 2003
Posts: 807
Likes: 2
G
UGN Super Poster
UGN Super Poster
G Offline
Joined: Jun 2003
Posts: 807
Likes: 2
Does this create vulnerabilities to use to access a system or is it just used to piss people off

#9375 06/24/03 08:24 PM
Joined: Apr 2003
Posts: 101
Member
Member
Joined: Apr 2003
Posts: 101
Typically the later. You might find http://www.UnderGroundNews.com/cgi-bin/ubbcgi/ultimatebb.cgi?ubb=get_topic;f=2;t=000013 of interest.


I don't measure a man's success by how high he climbs but how high he bounces when he hits bottom.
--General George S. Patton
#9376 06/24/03 08:38 PM
Joined: Jun 2003
Posts: 807
Likes: 2
G
UGN Super Poster
UGN Super Poster
G Offline
Joined: Jun 2003
Posts: 807
Likes: 2
no offense obi wan but that has nothing to do with my question, nor does it say anwhere anything relating to denial of service

Think before you type

#9377 06/25/03 11:07 AM
Joined: Mar 2002
Posts: 815
S
nobody
nobody
S Offline
Joined: Mar 2002
Posts: 815
Denail of service attacks cuts off access to services and information. If it's done to an internet based company like amazon or ebay, they loose buisness and lots of money from wasted bandwidth that they are paying for. Distrubuted Denail of Service or DDoS attacks use many machines to attack one. Some like, SYN Connect attacks, abuse the way computers recieve tcp connections, the 3 way handshake. Smurf attacks use forged hosts in icmp packet headers. So they can be sent out to millions of machines and they all return to the victim computer flooding it with responses, when it never made the requests in the fist place. They abuse other faults in the way TCP/IP works. To understand them you first need to understand TCP/IP.
Others abuse the actualy defects in the hardware itself, like the ping of death. It sends the command to hanf up to your modem, +++ATH0. Some abuse faults in server programs with buffer overflows which can also be used to exploit systems. If you want to understand all the defects of a system you should understand how that system works first.

#9378 06/25/03 01:04 PM
Joined: Jun 2003
Posts: 807
Likes: 2
G
UGN Super Poster
UGN Super Poster
G Offline
Joined: Jun 2003
Posts: 807
Likes: 2
Ok that explains it thanks


Link Copied to Clipboard
Member Spotlight
None yet
Forum Statistics
Forums41
Topics33,840
Posts68,858
Members2,176
Most Online3,253
Jan 13th, 2020
Latest Postings
Top Posters
UGN Security 41,392
Gremelin 7,203
§intå× 3,255
SilentRage 1,273
Ice 1,146
pergesu 1,136
Infinite 1,041
jonconley 955
Girlie 908
unreal 860
Top Likes Received
Ghost 2
Dartur 1
Cyrez 1
Girlie 1
unreal 1
Powered by UBB.threads™ PHP Forum Software 8.0.0