Eicon Networks S92 Uživatelský manuál Strana 195

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 194
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 195
DoSattack
TheDoSattackthatIwilluseisaSmurfattack.AccordingtoSymantec,Smurfattack
isaformofDoSthatusesping:
“In thecaseofaSmurfDoSattack,theping'spacketreturnIPaddressisforgedwith
theIPofthetargetedmachine. ThepingisissuedtotheentireI Pbroadcastaddress.
Thiscauseseverymachinetorespondtotheboguspingpacketsandreplytothe
targetedmachine,whichfloodsit.ThisiscalledaSmurfattackbecausetheDoStool
usedtoperformtheattackiscalledSmurf.”
69
Asdescribedby pentics.net,
“Therearetwopartieswhoarehurt bythisattack... theintermediary(broadcast)
deviceslet'scallthem"amplifiers",andthespoofedaddresstarget,orthe"victim".
Thevictimisthetargetofalargeamountoftrafficthattheamplifiersgenerate.”70
Sincewehave50compromisedDSLsystemsatourdisposal,anattackofa
reasonablestrengthcanbelaunched.Theroleofthesecompromisedsystemswillbe
discussedshortly.
TheAmplifiers
Whocanactasamplifier?
Basically,anynetworkwithroutersacceptingIPdirectedbroadcastandhosts
acceptingICMPpacketscanbeusedasamplifiers.
Howdowelocatetheseamplifiers?
69
http://www.symantec.com/avcenter/venc/data/smurf.dos.attack.html
70
http://www.pentics.net/denialofservice/whitepapers/smurf.cgi
Zobrazit stránku 194
1 2 ... 190 191 192 193 194 195 196 197 198 199 200 ... 208 209

Komentáře k této Příručce

Žádné komentáře