Eicon Networks S92 Bedienungsanleitung Seite 195

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 194
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 195
DoSattack
TheDoSattackthatIwilluseisaSmurfattack.AccordingtoSymantec,Smurfattack
isaformofDoSthatusesping:
“In thecaseofaSmurfDoSattack,theping'spacketreturnIPaddressisforgedwith
theIPofthetargetedmachine. ThepingisissuedtotheentireI Pbroadcastaddress.
Thiscauseseverymachinetorespondtotheboguspingpacketsandreplytothe
targetedmachine,whichfloodsit.ThisiscalledaSmurfattackbecausetheDoStool
usedtoperformtheattackiscalledSmurf.”
69
Asdescribedby pentics.net,
“Therearetwopartieswhoarehurt bythisattack... theintermediary(broadcast)
deviceslet'scallthem"amplifiers",andthespoofedaddresstarget,orthe"victim".
Thevictimisthetargetofalargeamountoftrafficthattheamplifiersgenerate.”70
Sincewehave50compromisedDSLsystemsatourdisposal,anattackofa
reasonablestrengthcanbelaunched.Theroleofthesecompromisedsystemswillbe
discussedshortly.
TheAmplifiers
Whocanactasamplifier?
Basically,anynetworkwithroutersacceptingIPdirectedbroadcastandhosts
acceptingICMPpacketscanbeusedasamplifiers.
Howdowelocatetheseamplifiers?
69
http://www.symantec.com/avcenter/venc/data/smurf.dos.attack.html
70
http://www.pentics.net/denialofservice/whitepapers/smurf.cgi
Seitenansicht 194
1 2 ... 190 191 192 193 194 195 196 197 198 199 200 ... 208 209

Kommentare zu diesen Handbüchern

Keine Kommentare