Eicon Networks S92 Manual de usuario Pagina 195

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 209
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 194
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 195
DoSattack
TheDoSattackthatIwilluseisaSmurfattack.AccordingtoSymantec,Smurfattack
isaformofDoSthatusesping:
“In thecaseofaSmurfDoSattack,theping'spacketreturnIPaddressisforgedwith
theIPofthetargetedmachine. ThepingisissuedtotheentireI Pbroadcastaddress.
Thiscauseseverymachinetorespondtotheboguspingpacketsandreplytothe
targetedmachine,whichfloodsit.ThisiscalledaSmurfattackbecausetheDoStool
usedtoperformtheattackiscalledSmurf.”
69
Asdescribedby pentics.net,
“Therearetwopartieswhoarehurt bythisattack... theintermediary(broadcast)
deviceslet'scallthem"amplifiers",andthespoofedaddresstarget,orthe"victim".
Thevictimisthetargetofalargeamountoftrafficthattheamplifiersgenerate.”70
Sincewehave50compromisedDSLsystemsatourdisposal,anattackofa
reasonablestrengthcanbelaunched.Theroleofthesecompromisedsystemswillbe
discussedshortly.
TheAmplifiers
Whocanactasamplifier?
Basically,anynetworkwithroutersacceptingIPdirectedbroadcastandhosts
acceptingICMPpacketscanbeusedasamplifiers.
Howdowelocatetheseamplifiers?
69
http://www.symantec.com/avcenter/venc/data/smurf.dos.attack.html
70
http://www.pentics.net/denialofservice/whitepapers/smurf.cgi
Vista de pagina 194
1 2 ... 190 191 192 193 194 195 196 197 198 199 200 ... 208 209

Comentarios a estos manuales

Sin comentarios