29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hacking For Beginners – Manthan Desai 2010<br />

27. How a ‘Denial of service’ attack works<br />

On February 6th, 2000 Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day,<br />

hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the<br />

morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually<br />

choked off.<br />

How a "denial of service" attacks works<br />

In a typical connection, the user sends a message asking the server to authenticate it. The server returns the<br />

authentication approval to the user. The user acknowledges this approval and then is allowed onto the server.<br />

In a denial of service attack, the user sends several authentication requests to the server, filling it up. All requests have<br />

false return addresses, so the server can't find the user when it tries to send the authentication approval. The server<br />

waits, sometimes more than a minute, before closing the connection. When it does close the connection, the attacker<br />

sends a new batch of forged requests, and the process begins again--tying up the service indefinitely.<br />

Typical connection<br />

w w w . h a c k i n g t e c h . c o . t v Page 151

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!