Eicon Networks S92 Instrukcja Użytkownika Strona 195

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 209
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 194
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 195
DoSattack
TheDoSattackthatIwilluseisaSmurfattack.AccordingtoSymantec,Smurfattack
isaformofDoSthatusesping:
“In thecaseofaSmurfDoSattack,theping'spacketreturnIPaddressisforgedwith
theIPofthetargetedmachine. ThepingisissuedtotheentireI Pbroadcastaddress.
Thiscauseseverymachinetorespondtotheboguspingpacketsandreplytothe
targetedmachine,whichfloodsit.ThisiscalledaSmurfattackbecausetheDoStool
usedtoperformtheattackiscalledSmurf.”
69
Asdescribedby pentics.net,
“Therearetwopartieswhoarehurt bythisattack... theintermediary(broadcast)
deviceslet'scallthem"amplifiers",andthespoofedaddresstarget,orthe"victim".
Thevictimisthetargetofalargeamountoftrafficthattheamplifiersgenerate.”70
Sincewehave50compromisedDSLsystemsatourdisposal,anattackofa
reasonablestrengthcanbelaunched.Theroleofthesecompromisedsystemswillbe
discussedshortly.
TheAmplifiers
Whocanactasamplifier?
Basically,anynetworkwithroutersacceptingIPdirectedbroadcastandhosts
acceptingICMPpacketscanbeusedasamplifiers.
Howdowelocatetheseamplifiers?
69
http://www.symantec.com/avcenter/venc/data/smurf.dos.attack.html
70
http://www.pentics.net/denialofservice/whitepapers/smurf.cgi
Przeglądanie stron 194
1 2 ... 190 191 192 193 194 195 196 197 198 199 200 ... 208 209

Komentarze do niniejszej Instrukcji

Brak uwag